First published: Wed Oct 27 2021(Updated: )
A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-ejjOgQEY This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA Software | =9.16<9.16.1.28=9.15<9.15.1.17>=9.13<=9.14<9.14.3.1>=9.9=9.10<=9.12<9.12.4.25>=9.7 and earlier<=9.8<9.8.4.40 | 9.16.1.28 9.15.1.17 9.14.3.1 9.12.4.25 9.8.4.40 |
Cisco FTD Software | >=6.5=6.6<=6.7<6.7.0.3 (Jan 2022)>=6.3 and earlier<=6.4<6.4.0.13 (Nov 2021) | 6.7.0.3 (Jan 2022) 6.4.0.13 (Nov 2021) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco ASA and FTD vulnerability is cisco-sa-asaftd-rule-bypass-ejjOgQEY.
The severity rating of cisco-sa-asaftd-rule-bypass-ejjOgQEY is medium (5.3).
The Cisco ASA Software versions 9.16, 9.15, 9.14, 9.12, 9.10, 9.8, and earlier are affected. The Cisco FTD Software versions 6.7, 6.6, 6.5, 6.4, 6.3, and earlier are also affected.
An unauthenticated, remote attacker can exploit cisco-sa-asaftd-rule-bypass-ejjOgQEY by bypassing security protections in the identity-based firewall (IDFW) rule processing feature of Cisco ASA and FTD Software.
Yes, there are remedy versions available for both Cisco ASA Software and Cisco FTD Software. Please refer to the Cisco Security Advisory for the specific remedy versions.