Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-20384

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-23 Oct, 2024 | 17:32
Updated At-24 Oct, 2024 | 17:04
Rejected At-
Credits

A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. This vulnerability is due to a logic error that occurs when NSG ACLs are populated on an affected device. An attacker could exploit this vulnerability by establishing a connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:23 Oct, 2024 | 17:32
Updated At:24 Oct, 2024 | 17:04
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. This vulnerability is due to a logic error that occurs when NSG ACLs are populated on an affected device. An attacker could exploit this vulnerability by establishing a connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco Adaptive Security Appliance (ASA) Software
Versions
Affected
  • 9.16.1
  • 9.16.1.28
  • 9.16.2
  • 9.16.2.3
  • 9.16.2.7
  • 9.16.2.11
  • 9.16.2.13
  • 9.16.2.14
  • 9.16.3
  • 9.16.3.3
  • 9.16.3.14
  • 9.16.3.15
  • 9.16.3.19
  • 9.16.3.23
  • 9.16.4
  • 9.16.4.9
  • 9.16.4.14
  • 9.16.4.18
  • 9.16.4.19
  • 9.16.4.27
  • 9.16.4.38
  • 9.16.4.39
  • 9.16.4.42
  • 9.16.4.48
  • 9.16.4.55
  • 9.16.4.57
  • 9.16.4.61
  • 9.17.1
  • 9.17.1.7
  • 9.17.1.9
  • 9.17.1.10
  • 9.17.1.11
  • 9.17.1.13
  • 9.17.1.15
  • 9.17.1.20
  • 9.17.1.30
  • 9.17.1.33
  • 9.17.1.39
  • 9.18.1
  • 9.18.1.3
  • 9.18.2
  • 9.18.2.5
  • 9.18.2.7
  • 9.18.2.8
  • 9.18.3
  • 9.18.3.39
  • 9.18.3.46
  • 9.18.3.53
  • 9.18.3.55
  • 9.18.3.56
  • 9.18.4
  • 9.18.4.5
  • 9.18.4.8
  • 9.18.4.22
  • 9.18.4.24
  • 9.18.4.29
  • 9.19.1
  • 9.19.1.5
  • 9.19.1.9
  • 9.19.1.12
  • 9.19.1.18
  • 9.19.1.22
  • 9.19.1.24
  • 9.19.1.27
  • 9.19.1.28
  • 9.19.1.31
  • 9.20.1
  • 9.20.1.5
  • 9.20.2
  • 9.20.2.10
  • 9.20.2.21
  • 9.20.2.22
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco Firepower Threat Defense Software
Versions
Affected
  • 7.0.0
  • 7.0.0.1
  • 7.0.1
  • 7.0.1.1
  • 7.0.2
  • 7.0.2.1
  • 7.0.3
  • 7.0.4
  • 7.0.5
  • 7.0.6
  • 7.0.6.1
  • 7.0.6.2
  • 7.1.0
  • 7.1.0.1
  • 7.1.0.2
  • 7.1.0.3
  • 7.2.0
  • 7.2.0.1
  • 7.2.1
  • 7.2.2
  • 7.2.3
  • 7.2.4
  • 7.2.4.1
  • 7.2.5
  • 7.2.5.1
  • 7.2.6
  • 7.2.7
  • 7.2.5.2
  • 7.2.8
  • 7.2.8.1
  • 7.3.0
  • 7.3.1
  • 7.3.1.1
  • 7.3.1.2
  • 7.4.0
  • 7.4.1
  • 7.4.1.1
  • 7.4.2
Problem Types
TypeCWE IDDescription
cweCWE-290Authentication Bypass by Spoofing
Type: cwe
CWE ID: CWE-290
Description: Authentication Bypass by Spoofing
Metrics
VersionBase scoreBase severityVector
3.15.8MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Version: 3.1
Base score: 5.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Cisco Systems, Inc.cisco
Product
adaptive_security_appliance
CPEs
  • cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 9.16.1 through 9.16.4.61 (custom)
  • From 9.17.1 through 9.17.1.39 (custom)
  • From 9.18.1 through 9.18.4.29 (custom)
  • From 9.19.1 through 9.19.1.31 (custom)
  • From 9.20.1 through 9.20.2.22 (custom)
Vendor
Cisco Systems, Inc.cisco
Product
firepower_threat_defense_software
CPEs
  • cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 7.0.0 through 7.0.6.2 (custom)
  • From 7.1.0 through 7.1.0.3 (custom)
  • From 7.2.0 through 7.2.8.1 (custom)
  • From 7.3.0 through 7.3.1.2 (custom)
  • From 7.4.0 through 7.4.2 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:23 Oct, 2024 | 18:15
Updated At:01 Aug, 2025 | 16:02

A vulnerability in the Network Service Group (NSG) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. This vulnerability is due to a logic error that occurs when NSG ACLs are populated on an affected device. An attacker could exploit this vulnerability by establishing a connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.8MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 5.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.1
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.1.28
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.2
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.2.3
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.2.7
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.2.11
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.2.13
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.2.14
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.3
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.3.3
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.3.14
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.3.15
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.3.19
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.3.23
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.9
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.14
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.18
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.18:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.19
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.19:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.27
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.27:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.38
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.38:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.39
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.39:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.42
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.42:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.48
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.48:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.55
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.55:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.57
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.57:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.16.4.61
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.61:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.7
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.9
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.10
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.11
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.13
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.15
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.20
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.30
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.33
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.33:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.17.1.39
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.39:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.1
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.1.3
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.2
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.2.5
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.2.7
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.2.8
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.3
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.3.39
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.39:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.3.46
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.46:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.3.53
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.53:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.3.55
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.55:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>adaptive_security_appliance_software>>9.18.3.56
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.56:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-290Secondarypsirt@cisco.com
CWE ID: CWE-290
Type: Secondary
Source: psirt@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsLpsirt@cisco.com
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL
Source: psirt@cisco.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

60Records found

CVE-2021-34749
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.41% / 60.73%
||
7 Day CHG~0.00%
Published-18 Aug, 2021 | 19:40
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Cisco Products Server Name Identification Data Exfiltration Vulnerability

A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ironport_web_security_appliancefirepower_management_center_virtual_appliance_firmwaresecure_firewall_management_centerCisco Web Security Appliance (WSA)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-34696
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.18% / 40.37%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:25
Updated-07 Nov, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco ASR 900 and ASR 920 Series Aggregation Services Routers Access Control List Bypass Vulnerability

A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asr_920-10sz-pdasr_920-24sz-m_rasr_920-12cz-aasr_920-24sz-imasr_907asr_920-12cz-d_rasr_920-4sz-d_rasr_920-24sz-mios_xeasr_903asr_920-4sz-aasr_920-12sz-im_rasr_920-12cz-a_rasr_920-10sz-pd_rasr_920-12cz-dasr_920-24sz-im_rasr_902asr_920-12sz-imasr_920-4sz-a_rasr_920-4sz-dasr_920-24tz-m_rasr_920u-12sz-imasr_920-24tz-mCisco IOS XE Software
CWE ID-CWE-284
Improper Access Control
CVE-2021-1534
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.28% / 50.90%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:35
Updated-07 Nov, 2024 | 21:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance URL Filtering Bypass Vulnerability

A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_appliance_c190asyncosemail_security_appliance_c390email_security_appliance_c380email_security_appliance_c170email_security_appliance_c680email_security_appliance_c690xemail_security_appliance_c690Cisco Email Security Appliance (ESA)
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1625
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.36% / 57.46%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:25
Updated-07 Nov, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Zone-Based Policy Firewall ICMP and UDP Inspection Vulnerability

A vulnerability in the Zone-Based Policy Firewall feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent the Zone-Based Policy Firewall from correctly classifying traffic. This vulnerability exists because ICMP and UDP responder-to-initiator flows are not inspected when the Zone-Based Policy Firewall has either Unified Threat Defense (UTD) or Application Quality of Experience (AppQoE) configured. An attacker could exploit this vulnerability by attempting to send UDP or ICMP flows through the network. A successful exploit could allow the attacker to inject traffic through the Zone-Based Policy Firewall, resulting in traffic being dropped because it is incorrectly classified or in incorrect reporting figures being produced by high-speed logging (HSL).

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-284
Improper Access Control
CVE-2021-1495
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.15% / 36.72%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 17:31
Updated-08 Nov, 2024 | 23:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of specific HTTP header parameters. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured file policy for HTTP packets and deliver a malicious payload.

Action-Not Available
Vendor-snortCisco Systems, Inc.
Product-c8200l-1n-4t1111x_integrated_services_routercatalyst_8300-1n1s-4t2xcatalyst_8500lsnort4431_integrated_services_router1160_integrated_services_routerc8200-1n-4tcatalyst_8300-1n1s-6tios_xe1100-4g\/6g_integrated_services_router4221_integrated_services_routercatalyst_8300-2n2s-4t2x4331_integrated_services_router4461_integrated_services_router3000_integrated_services_routercatalyst_8300-2n2s-6t1101_integrated_services_router1109_integrated_services_router111x_integrated_services_router1120_integrated_services_routerfirepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2021-1494
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.17% / 38.66%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 16:21
Updated-18 Nov, 2024 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of specific HTTP header parameters. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured file policy for HTTP packets and deliver a malicious payload.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Firepower Threat Defense SoftwareCisco UTD SNORT IPS Engine Softwarefirepower_threat_defense_softwareutd_snort_ips_engine_software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2021-1389
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.23% / 45.24%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:40
Updated-08 Nov, 2024 | 23:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR and Cisco NX-OS Software IPv6 Access Control List Bypass Vulnerability

A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ncs_5502-sencs_5508ncs_5501ncs_540ncs_560nx-osncs_5516nexus_9500_rnexus_3600ios_xrncs_5502ncs_5501-seCisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CVE-2021-27853
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 8.21%
||
7 Day CHG~0.00%
Published-27 Sep, 2022 | 17:55
Updated-21 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
L2 network filtering can be bypassed using stacked VLAN0 and LLC/SNAP headers

Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.

Action-Not Available
Vendor-ieeeIEEEThe IETF Administration LLC (IETF LLC)Cisco Systems, Inc.
Product-catalyst_3650-48pd-ln9k-x9788tc-fxcatalyst_3650-48fqm-snexus_92300ycn9k-c93600cd-gx_firmwarecatalyst_3850-24xu-en9k-x9788tc-fx_firmwarecatalyst_3650-24ps-lsg500-52nexus_9536pq_firmwaresf500-48mp_firmwarenexus_9364c-gxn9k-x9636c-r_firmwaresg500x-24mppcatalyst_3650-12x48uz-ssg500-28nexus_9516catalyst_6509-v-enexus_x9636q-rsg500-28mppnexus_92300yc_firmwaren9k-x9432c-snexus_93360yc-fx2_firmwarecatalyst_3850-24p-lp802.1qcatalyst_3650-48fq-scatalyst_3650-24pd-ln9k-c9316d-gxcatalyst_9400catalyst_6800ia_firmwarecatalyst_3650-48fs-lcatalyst_3650-24pdm-ecatalyst_3850-16xs-ecatalyst_3850-48u-snexus_93240yc-fx2sf-500-24mp_firmwarecatalyst_3650-8x24uq-sn9k-x9464tx2_firmwarecatalyst_6506-enexus_9636pqnexus_9336c-fx2-e_firmwarecatalyst_3650-48fd-scatalyst_3650-12x48uq-enexus_9716d-gxcatalyst_c3850-12x48u-scatalyst_3650-24ts-ecatalyst_c6816-x-len9k-x9736c-fxnexus_9336c-fx2-ecatalyst_3650-48fs-ecatalyst_6800iacatalyst_3650-48ts-snexus_93180yc-fxcatalyst_3850-12xs-ecatalyst_3650-24td-lcatalyst_3650-12x48ur-ssf500-24_firmwaremeraki_ms390_firmwarecatalyst_9600catalyst_3650-12x48fd-scatalyst_3850-24p-en9k-c9332d-gx2b_firmwarenexus_9364c_firmwarenexus_9348gc-fxpcatalyst_3650-24ps-emeraki_ms250catalyst_6503-e_firmwarecatalyst_6503-ecatalyst_3650-48ts-lcatalyst_6880-xmeraki_ms410_firmwarecatalyst_3650-48fqm-lnexus_9516_firmwaren9k-x9464tx2meraki_ms355_firmwarecatalyst_3650-24ps-snexus_9236c_firmwarenexus_93180yc-ex_firmwaresg500x-48mpp_firmwarenexus_92304qc_firmwaremeraki_ms210catalyst_3850-48t-eieee_802.2n9k-x97160yc-ex_firmwarecatalyst_3850-48f-lsg500x-24p_firmwarecatalyst_3850-24xs-ecatalyst_3650-24pd-scatalyst_3850-32xs-sn9k-x9564px_firmwarecatalyst_9300lmsg500-52p_firmwarecatalyst_3650-48fd-lcatalyst_c6824-x-le-40g_firmwaremeraki_ms450catalyst_3850-24pw-scatalyst_6509-neb-anexus_9716d-gx_firmwarecatalyst_3650-24ts-lnexus_9432pq_firmwarecatalyst_3650-24pdm-snexus_93180yc-fx3_firmwarenexus_93108tc-fx3p_firmwarecatalyst_6807-xl_firmwaren9k-x9564pxsg500x-24pnexus_93108tc-fxcatalyst_3650-8x24pd-lmeraki_ms410catalyst_9200cxnexus_93216tc-fx2_firmwaren9k-x97160yc-exnexus_93180yc-fx_firmwaresg500-52mpnexus_93108tc-fx_firmwarecatalyst_9500hcatalyst_6506-e_firmwarecatalyst_3850-48t-ssf500-18p_firmwaresg500-52mp_firmwarecatalyst_6513-ecatalyst_3850-48xs-f-en9k-x9736c-excatalyst_3850-12xs-snexus_9332cmeraki_ms350_firmwarecatalyst_3650-12x48uz-enexus_9236ccatalyst_6880-x_firmwarecatalyst_3650-48fd-esf500-48catalyst_3650-24td-ecatalyst_9600xnexus_93120tx_firmwarecatalyst_6807-xlcatalyst_6840-xnexus_9736pqn9k-c9364d-gx2acatalyst_3850-24t-esg500x-48p_firmwaren9k-c9332d-gx2bsg500x-48mppcatalyst_3650-24pdm-lsg500x-24mpp_firmwarenexus_9736pq_firmwarecatalyst_3650-48tq-esg500-28psf500-48mpsg500x-24meraki_ms250_firmwaren9k-x9736c-ex_firmwarecatalyst_6509-e_firmwarecatalyst_3650-12x48fd-lcatalyst_3850-48pw-snexus_93120txcatalyst_6509-ecatalyst_c6824-x-le-40gcatalyst_3650-48fs-scatalyst_3650-48ts-ecatalyst_3850-48p-ecatalyst_3650-48fq-ecatalyst_3650-48tq-scatalyst_6504-e_firmwarecatalyst_c6832-x-le_firmwarenexus_93180yc-fx3nexus_9800_firmwarecatalyst_3850-24xs-smeraki_ms225_firmwarecatalyst_3650-8x24pd-ssf500-18pcatalyst_6509-neb-a_firmwaresg500-52pmeraki_ms350meraki_ms420catalyst_3850-48f-ecatalyst_3850-48xs-f-scatalyst_3650-12x48fd-ecatalyst_6504-ecatalyst_3650-48td-lnexus_9432pqsf500-48_firmwarecatalyst_3650-12x48ur-lcatalyst_3850-48xs-ecatalyst_3850-48u-esg500x-24_firmwarecatalyst_3650-48ps-enexus_93180yc-excatalyst_3650-48td-scatalyst_3850-24t-lcatalyst_6509-v-e_firmwarenexus_93216tc-fx2sf-500-24mpcatalyst_3650-12x48uq-lcatalyst_9300lcatalyst_3850-48p-ln9k-c9348d-gx2a_firmwarenexus_9272q_firmwarecatalyst_3850-24xu-smeraki_ms450_firmwarecatalyst_3850-24s-en9k-x9432c-s_firmwarenexus_93240yc-fx2_firmwarecatalyst_3850-24t-snexus_9364c-gx_firmwarecatalyst_3650-48fq-lnexus_92348gc-x_firmwaren9k-x9736c-fx_firmwaren9k-c9316d-gx_firmwarecatalyst_3650-12x48uz-lcatalyst_3650-48td-eios_xecatalyst_3650-48pd-scatalyst_3850-12s-smeraki_ms225nexus_92160yc-xcatalyst_3650-8x24uq-ecatalyst_9200sg500-52_firmwarecatalyst_9200ln9k-x9636c-rnexus_9336c-fx2catalyst_3850-48xs-scatalyst_3850-24u-ecatalyst_9500catalyst_c6840-x-le-40gnexus_x9636q-r_firmwaresf500-24p_firmwaresg500-28_firmwarenexus_9800nexus_9636pq_firmwarecatalyst_c6832-x-len9k-x9732c-fxnexus_9504_firmwarecatalyst_9300nexus_9332c_firmwarecatalyst_3850-48p-scatalyst_c6840-x-le-40g_firmwaren9k-x9564tx_firmwarecatalyst_3650-12x48uq-sn9k-x9732c-excatalyst_3650-8x24pd-enexus_93360yc-fx2catalyst_3850-32xs-enexus_92348gc-xnexus_9272qn9k-c9364d-gx2a_firmwaremeraki_ms390catalyst_3850-24xu-lcatalyst_3650-48tq-ln9k-x9564txsg500x-48_firmwarecatalyst_9300xn9k-x9464pxnexus_9508_firmwaren9k-x9732c-fx_firmwarenexus_93108tc-exn9k-x9636c-rxn9k-c9348d-gx2anexus_9536pqmeraki_ms210_firmwaremeraki_ms425_firmwarecatalyst_3650-48pq-ln9k-c93600cd-gxnexus_9504catalyst_3650-48fqm-emeraki_ms355meraki_ms420_firmwarecatalyst_3650-24ts-sn9k-x9464px_firmwarecatalyst_3850-48f-scatalyst_3850-24u-lcatalyst_3650-48pq-scatalyst_3650-48pd-esg500-28mpp_firmwaresf500-24catalyst_c6816-x-le_firmwarecatalyst_3850-48u-lnexus_93108tc-fx3pcatalyst_3650-48pq-ecatalyst_6840-x_firmwarecatalyst_3850-24u-snexus_9364csf500-24pmeraki_ms425catalyst_3650-12x48ur-enexus_93108tc-ex_firmwarecatalyst_3650-48ps-scatalyst_c3850-12x48u-ecatalyst_3850-48t-lnexus_9336c-fx2_firmwarecatalyst_3850-16xs-snexus_9348gc-fxp_firmwaresg500-28p_firmwarecatalyst_3650-8x24uq-lsg500x-48pcatalyst_3650-24pd-enexus_92160yc-x_firmwaren9k-x9732c-ex_firmwaren9k-x9636c-rx_firmwarecatalyst_3850-12s-ecatalyst_3650-48ps-lsg500x-48catalyst_6513-e_firmwarenexus_92304qcnexus_9508catalyst_c3850-12x48u-lcatalyst_3850-24s-scatalyst_3650-24td-s802.2draft-ietf-v6ops-ra-guardP802.1Q
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2023-20025
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9||CRITICAL
EPSS-0.28% / 50.74%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 01:33
Updated-07 Apr, 2025 | 13:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, and RV082 Routers could allow an unauthenticated, remote attacker to bypass authentication on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass authentication and gain root access on the underlying operating system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv042_firmwarerv016rv042g_firmwarerv082_firmwarerv042grv042rv016_firmwarerv082Cisco Small Business RV Series Router Firmware
CWE ID-CWE-290
Authentication Bypass by Spoofing
CWE ID-CWE-293
Using Referer Field for Authentication
CVE-2020-10136
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-5.3||MEDIUM
EPSS-19.96% / 95.25%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 08:35
Updated-17 Sep, 2024 | 00:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IP-in-IP protocol allows a remote, unauthenticated attacker to route arbitrary network traffic

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

Action-Not Available
Vendor-treckdigiCisco Systems, Inc.HP Inc.The IETF Administration LLC (IETF LLC)
Product-nexus_93180lc-exnexus_56128pnexus_3132qnexus_9332pqnexus_93108tc-exucs_6332-16upnexus_3016x3220nr_firmwarenx-osnexus_9372pxnexus_9508nexus_5696qnexus_93120txnexus_92304qcnexus_93128txnexus_9336pq_aci_spineucs_6248upnexus_6004nexus_1000venexus_9504nexus_3048nexus_6001nexus_9372tx-enexus_93108tc-fxnexus_93360yc-fx2sarosucs_6324nexus_9396txnexus_9332cnexus_9364cnexus_7000nexus_92348gc-xnexus_5020nexus_3064nexus_9336c-fx2unified_computing_systemucs_6332nexus_5548pnexus_5548upnexus_5648qnexus_9348gc-fxpnexus_3172nexus_9272qnexus_9396pxucs_6296upnexus_5010nexus_93216tc-fx2nexus_1000vnexus_5672upnexus_5596tnexus_93240yc-fx2nexus_93180yc-fxnexus_9372txnexus_5624qnexus_3064-tucs_managernexus_93180yc-exnexus_9372px-enexus_9236cnexus_9516nexus_5596upnexus_7700tcp\/ipRFC2003 - IP Encapsulation within IP
CWE ID-CWE-290
Authentication Bypass by Spoofing
  • Previous
  • 1
  • 2
  • Next
Details not found