gsd-2023-20256
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.
Aliases
Aliases
{ GSD: { alias: "CVE-2023-20256", id: "GSD-2023-20256", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2023-20256", ], details: "Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.", id: "GSD-2023-20256", modified: "2023-12-13T01:20:27.625572Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2023-20256", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Adaptive Security Appliance (ASA) Software", version: { version_data: [ { version_affected: "=", version_value: "9.8.4.25", }, { version_affected: "=", version_value: "9.8.4.22", }, { version_affected: "=", version_value: "9.8.4.26", }, { version_affected: "=", version_value: "9.8.4.29", }, { version_affected: "=", version_value: "9.8.4.32", }, { version_affected: "=", version_value: "9.8.4.33", }, { version_affected: "=", version_value: "9.8.4.34", }, { version_affected: "=", version_value: "9.8.4.35", }, { version_affected: "=", version_value: "9.8.4.39", }, { version_affected: "=", version_value: "9.8.4.40", }, { version_affected: "=", version_value: "9.8.4.41", }, { version_affected: "=", version_value: "9.8.4.43", }, { version_affected: "=", version_value: "9.8.4.44", }, { version_affected: "=", version_value: "9.8.4.45", }, { version_affected: "=", version_value: "9.8.4.46", }, { version_affected: "=", version_value: "9.8.4.48", }, { version_affected: "=", version_value: "9.12.4.2", }, { version_affected: "=", version_value: "9.12.4.4", }, { version_affected: "=", version_value: "9.12.4.7", }, { version_affected: "=", version_value: "9.12.4.10", }, { version_affected: "=", version_value: "9.12.4.13", }, { version_affected: "=", version_value: "9.12.4.8", }, { version_affected: "=", version_value: "9.12.4.18", }, { version_affected: "=", version_value: "9.12.4.24", }, { version_affected: "=", version_value: "9.12.4.26", }, { version_affected: "=", version_value: "9.12.4.29", }, { version_affected: "=", version_value: "9.12.4.30", }, { version_affected: "=", version_value: "9.12.4.35", }, { version_affected: "=", version_value: "9.12.4.37", }, { version_affected: "=", version_value: "9.12.4.38", }, { version_affected: "=", version_value: "9.12.4.39", }, { version_affected: "=", version_value: "9.12.4.40", }, { version_affected: "=", version_value: "9.12.4.41", }, { version_affected: "=", version_value: "9.12.4.47", }, { version_affected: "=", version_value: "9.12.4.48", }, { version_affected: "=", version_value: "9.12.4.50", }, { version_affected: "=", version_value: "9.12.4.52", }, { version_affected: "=", version_value: "9.12.4.54", }, { version_affected: "=", version_value: "9.12.4.55", }, { version_affected: "=", version_value: "9.12.4.56", }, { version_affected: "=", version_value: "9.14.1.10", }, { version_affected: "=", version_value: "9.14.1.15", }, { version_affected: "=", version_value: "9.14.1.19", }, { version_affected: "=", version_value: "9.14.1.30", }, { version_affected: "=", version_value: "9.14.2", }, { version_affected: "=", version_value: "9.14.2.4", }, { version_affected: "=", version_value: "9.14.2.8", }, { version_affected: "=", version_value: "9.14.2.13", }, { version_affected: "=", version_value: "9.14.2.15", }, { version_affected: "=", version_value: "9.14.3", }, { version_affected: "=", version_value: "9.14.3.1", }, { version_affected: "=", version_value: "9.14.3.9", }, { version_affected: "=", version_value: "9.14.3.11", }, { version_affected: "=", version_value: "9.14.3.13", }, { version_affected: "=", version_value: "9.14.3.18", }, { version_affected: "=", version_value: "9.14.3.15", }, { version_affected: "=", version_value: "9.14.4", }, { version_affected: "=", version_value: "9.14.4.6", }, { version_affected: "=", version_value: "9.14.4.7", }, { version_affected: "=", version_value: "9.14.4.12", }, { version_affected: "=", version_value: "9.14.4.13", }, { version_affected: "=", version_value: "9.14.4.14", }, { version_affected: "=", version_value: "9.14.4.15", }, { version_affected: "=", version_value: "9.14.4.17", }, { version_affected: "=", version_value: "9.14.4.22", }, { version_affected: "=", version_value: "9.14.4.23", }, { version_affected: "=", version_value: "9.15.1", }, { version_affected: "=", version_value: "9.15.1.7", }, { version_affected: "=", version_value: "9.15.1.10", }, { version_affected: "=", version_value: "9.15.1.15", }, { version_affected: "=", version_value: "9.15.1.16", }, { version_affected: "=", version_value: "9.15.1.17", }, { version_affected: "=", version_value: "9.15.1.1", }, { version_affected: "=", version_value: "9.15.1.21", }, { version_affected: "=", version_value: "9.16.1", }, { version_affected: "=", version_value: "9.16.1.28", }, { version_affected: "=", version_value: "9.16.2", }, { version_affected: "=", version_value: "9.16.2.3", }, { version_affected: "=", version_value: "9.16.2.7", }, { version_affected: "=", version_value: "9.16.2.11", }, { version_affected: "=", version_value: "9.16.2.13", }, { version_affected: "=", version_value: "9.16.2.14", }, { version_affected: "=", version_value: "9.16.3", }, { version_affected: "=", version_value: "9.16.3.3", }, { version_affected: "=", version_value: "9.16.3.14", }, { version_affected: "=", version_value: "9.16.3.15", }, { version_affected: "=", version_value: "9.16.3.19", }, { version_affected: "=", version_value: "9.16.3.23", }, { version_affected: "=", version_value: "9.16.4", }, { version_affected: "=", version_value: "9.16.4.9", }, { version_affected: "=", version_value: "9.16.4.14", }, { version_affected: "=", version_value: "9.17.1", }, { version_affected: "=", version_value: "9.17.1.7", }, { version_affected: "=", version_value: "9.17.1.9", }, { version_affected: "=", version_value: "9.17.1.10", }, { version_affected: "=", version_value: "9.17.1.11", }, { version_affected: "=", version_value: "9.17.1.13", }, { version_affected: "=", version_value: "9.17.1.15", }, { version_affected: "=", version_value: "9.17.1.20", }, { version_affected: "=", version_value: "9.17.1.30", }, { version_affected: "=", version_value: "9.18.1", }, { version_affected: "=", version_value: "9.18.1.3", }, { version_affected: "=", version_value: "9.18.2", }, { version_affected: "=", version_value: "9.18.2.5", }, { version_affected: "=", version_value: "9.18.2.7", }, { version_affected: "=", version_value: "9.18.2.8", }, { version_affected: "=", version_value: "9.18.3", }, { version_affected: "=", version_value: "9.19.1", }, { version_affected: "=", version_value: "9.19.1.5", }, ], }, }, { product_name: "Cisco Firepower Threat Defense Software", version: { version_data: [ { version_affected: "=", version_value: "6.2.3.16", }, { version_affected: "=", version_value: "6.2.3.17", }, { version_affected: "=", version_value: "6.2.3.18", }, { version_affected: "=", version_value: "6.6.1", }, { version_affected: "=", version_value: "6.6.3", }, { version_affected: "=", version_value: "6.6.4", }, { version_affected: "=", version_value: "6.6.5", }, { version_affected: "=", version_value: "6.6.5.1", }, { version_affected: "=", version_value: "6.6.5.2", }, { version_affected: "=", version_value: "6.6.7", }, { version_affected: "=", version_value: "6.6.7.1", }, { version_affected: "=", version_value: "6.4.0.10", }, { version_affected: "=", version_value: "6.4.0.11", }, { version_affected: "=", version_value: "6.4.0.12", }, { version_affected: "=", version_value: "6.4.0.13", }, { version_affected: "=", version_value: "6.4.0.14", }, { version_affected: "=", version_value: "6.4.0.15", }, { version_affected: "=", version_value: "6.4.0.16", }, { version_affected: "=", version_value: "6.7.0", }, { version_affected: "=", version_value: "6.7.0.1", }, { version_affected: "=", version_value: "6.7.0.2", }, { version_affected: "=", version_value: "6.7.0.3", }, { version_affected: "=", version_value: "7.0.0", }, { version_affected: "=", version_value: "7.0.0.1", }, { version_affected: "=", version_value: "7.0.1", }, { version_affected: "=", version_value: "7.0.1.1", }, { version_affected: "=", version_value: "7.0.2", }, { version_affected: "=", version_value: "7.0.2.1", }, { version_affected: "=", version_value: "7.0.3", }, { version_affected: "=", version_value: "7.0.4", }, { version_affected: "=", version_value: "7.0.5", }, { version_affected: "=", version_value: "7.1.0", }, { version_affected: "=", version_value: "7.1.0.1", }, { version_affected: "=", version_value: "7.1.0.2", }, { version_affected: "=", version_value: "7.1.0.3", }, { version_affected: "=", version_value: "7.2.0", }, { version_affected: "=", version_value: "7.2.0.1", }, { version_affected: "=", version_value: "7.2.1", }, { version_affected: "=", version_value: "7.2.2", }, { version_affected: "=", version_value: "7.2.3", }, { version_affected: "=", version_value: "7.3.0", }, { version_affected: "=", version_value: "7.3.1", }, { version_affected: "=", version_value: "7.3.1.1", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: [ { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, ], }, problemtype: { problemtype_data: [ { description: [ { cweId: "CWE-290", lang: "eng", value: "Authentication Bypass by Spoofing", }, ], }, ], }, references: { reference_data: [ { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb", refsource: "MISC", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb", }, ], }, source: { advisory: "cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb", defects: [ "CSCwd30856", ], discovery: "EXTERNAL", }, }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*", matchCriteriaId: "23CD5619-E534-4F40-998D-39DC19FA0451", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*", matchCriteriaId: "C5D0EB11-14B1-44B3-8D46-B9DD872F772C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*", matchCriteriaId: "4FA399CF-12DB-42E0-A66F-14508B52A453", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*", matchCriteriaId: "7B5A7608-E737-420E-9B5E-836600DAC701", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*", matchCriteriaId: "C7EB6801-336D-4F41-ADE7-1C58C63C3F6F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*", matchCriteriaId: "8413DA41-02A5-4269-8C88-9DD5076AF91B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*", matchCriteriaId: "AA00285F-6914-4749-8A47-FC4EDAFFF3C9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*", matchCriteriaId: "4AA4D367-32B9-4F54-8352-A959F61A1FDC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*", matchCriteriaId: "2259FF9E-0C8B-440F-B1AC-51BDE3F60E68", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*", matchCriteriaId: "3C522B55-904D-4C08-B73E-1457D877C0AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*", matchCriteriaId: "4483056A-FBF3-4E00-81EB-1E97334EF240", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*", matchCriteriaId: "48677330-06AB-4C7F-B2AD-F7E465A9632A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.44:*:*:*:*:*:*:*", matchCriteriaId: "7AEA80D2-5DB8-4334-9A88-7DDE395832C8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.45:*:*:*:*:*:*:*", matchCriteriaId: "FB1C38A5-1028-4AD3-8CC7-A00091091E76", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.46:*:*:*:*:*:*:*", matchCriteriaId: "848147B2-C49A-43F6-9069-FC8885BDFDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*", matchCriteriaId: "D6FEF0DA-741E-4361-8143-068EB47D6520", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*", matchCriteriaId: "7E23ACB0-DF8B-4672-A819-4DCD3104CE4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*", matchCriteriaId: "E4723B88-62BA-40E6-AA89-BAC02D6A036F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*", matchCriteriaId: "7C698819-3C8E-4A16-8F52-42FF1E54C076", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*", matchCriteriaId: "8D3CE74E-59E7-448A-8417-18F97C05C798", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*", matchCriteriaId: "0986C171-0E75-4F6F-A9BD-276830104E5B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*", matchCriteriaId: "66A2777A-7831-4324-AEB2-5D93B5F6C04B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*", matchCriteriaId: "37045680-9189-4B7F-A4F7-4E682FE20A09", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*", matchCriteriaId: "B6C9F37B-CF3C-4861-A969-C7CF4946274A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*", matchCriteriaId: "6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*", matchCriteriaId: "FB938E58-4963-4A31-8836-88E958592B30", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*", matchCriteriaId: "1E317897-EE97-44F3-96BB-E54228D72A7A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*", matchCriteriaId: "1EF7FAB2-158D-4C48-9246-E7AD3BF1D801", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*", matchCriteriaId: "056D43AE-ECDB-40D2-A196-18DDCD02629E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.38:*:*:*:*:*:*:*", matchCriteriaId: "D3E555F3-3580-4D71-8D8D-92FE72763D62", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.39:*:*:*:*:*:*:*", matchCriteriaId: "93013503-8B9A-4160-AF7E-277958FA6E9D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.40:*:*:*:*:*:*:*", matchCriteriaId: "A3B009FD-0F2B-4511-8EDF-C3E670623F89", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.41:*:*:*:*:*:*:*", matchCriteriaId: "52579D8D-E855-42B3-B406-32DD1C39F721", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.47:*:*:*:*:*:*:*", matchCriteriaId: "E7E44FC6-12A2-4F76-A095-28F3804B619F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.48:*:*:*:*:*:*:*", matchCriteriaId: "42917E5E-E362-4B40-B2B2-3C77BA35641C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.50:*:*:*:*:*:*:*", matchCriteriaId: "CF317FA3-EBF3-49BB-A9E6-0D4295FA3F60", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.52:*:*:*:*:*:*:*", matchCriteriaId: "F98B1683-914F-43D3-AE1C-311D3A90BE8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.54:*:*:*:*:*:*:*", matchCriteriaId: "A8D24656-CAB1-4A98-A440-482927FEDD16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.55:*:*:*:*:*:*:*", matchCriteriaId: "E504557C-DA5D-4D0F-A813-4CE7D5109F15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.56:*:*:*:*:*:*:*", matchCriteriaId: "04D2A067-C717-4921-BBF5-3EFBE02736EC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*", matchCriteriaId: "F4187EFE-4D7E-4493-A6E0-24C98256CF79", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*", matchCriteriaId: "6730194F-5069-40AB-AE66-871D3992560C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*", matchCriteriaId: "9E257F98-D1A0-4D28-9504-1749CC090D49", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*", matchCriteriaId: "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*", matchCriteriaId: "4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*", matchCriteriaId: "589E46F3-8038-4B87-8C40-55C6268B82F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*", matchCriteriaId: "3F3B73F6-139E-42DC-B895-DDD17B5A1138", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*", matchCriteriaId: "0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*", matchCriteriaId: "3E4FD5E3-7E82-4294-8B05-D2045D857029", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*", matchCriteriaId: "4E998A4A-5346-4CFA-A617-FD1106C6B7A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*", matchCriteriaId: "91265549-A16E-4A00-A031-4F1EB8D6881C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*", matchCriteriaId: "EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*", matchCriteriaId: "ECE6D033-7B8B-4F61-B653-0C0EF13466EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*", matchCriteriaId: "14441650-DAD5-4959-83DF-4D6F3D6A05FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*", matchCriteriaId: "1B21ABC9-A64B-43E4-8951-1E6C0F427DBB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.18:*:*:*:*:*:*:*", matchCriteriaId: "A48EC041-322F-422D-B95B-0FC07BDA2B6B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4:*:*:*:*:*:*:*", matchCriteriaId: "FE0D50C0-DADB-4747-8649-8A5257111FE6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.6:*:*:*:*:*:*:*", matchCriteriaId: "FEE2699F-353F-44CB-A778-981783DDC31F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.7:*:*:*:*:*:*:*", matchCriteriaId: "7D8E50BD-1FBD-483B-9C27-70E95C732E55", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.12:*:*:*:*:*:*:*", matchCriteriaId: "F46E5E4F-787C-4C05-B1E7-C39BB9125D16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.13:*:*:*:*:*:*:*", matchCriteriaId: "D6A29312-38E7-456B-94DD-4D7329691114", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.14:*:*:*:*:*:*:*", matchCriteriaId: "27F7BB31-C733-4C32-BF0F-33B5AF020156", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.15:*:*:*:*:*:*:*", matchCriteriaId: "DC313568-33A6-435B-98FF-8A7091D9C451", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.17:*:*:*:*:*:*:*", matchCriteriaId: "7F85710A-28CE-4913-8523-356461908FBE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.22:*:*:*:*:*:*:*", matchCriteriaId: "D6069950-016B-419A-B754-D58956CB6D14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.23:*:*:*:*:*:*:*", matchCriteriaId: "5A2F3FEC-624F-47C5-B056-836861BB038A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*", matchCriteriaId: "EA0B9B73-A9E6-4924-9EAE-B57E534938FD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*", matchCriteriaId: "012812C4-EFF8-465F-A771-134BEB617CC9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*", matchCriteriaId: "E06141A9-8C37-445A-B58A-45739AFE7D4C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*", matchCriteriaId: "7EDC09E5-51D3-4672-B910-B34A9CBD6128", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*", matchCriteriaId: "71ED7A71-81CB-444C-A4ED-EA4A58D5E73C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*", matchCriteriaId: "CAD13331-0EB8-4C8D-85CC-D96CA9F829AE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*", matchCriteriaId: "7137F22B-F993-4620-9378-9412DAEA9EF6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.21:*:*:*:*:*:*:*", matchCriteriaId: "923A40E8-6456-4288-B9AB-DBF5F9C4246A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*", matchCriteriaId: "13F57A86-6284-4269-823E-B30C57185D14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*", matchCriteriaId: "F6560447-039C-40FA-A24D-C8994AC2743B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*", matchCriteriaId: "378ED826-F5FE-40BA-9FC0-9C185A13518B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*", matchCriteriaId: "130B6FD9-764D-4EF8-91AA-37E52AE9B3E3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*", matchCriteriaId: "225861CE-FFF8-4AFA-A07B-CB8D5BC9C361", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*", matchCriteriaId: "FD08C4E8-3ADB-4048-9B3C-4F0385201523", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*", matchCriteriaId: "A4875811-F209-49ED-B310-8377B2F87FF9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*", matchCriteriaId: "99C52C7B-B626-4A3C-A2EC-28A20E7FA95F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*", matchCriteriaId: "08CCBF5E-257A-4A1F-8930-3643A9588838", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*", matchCriteriaId: "782BC9ED-1395-472B-9F34-DED812AA5BFD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*", matchCriteriaId: "153449C0-B93F-49A2-8A6A-BE84305E8D2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*", matchCriteriaId: "853A002C-839A-4372-8485-750A86E9F6E9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*", matchCriteriaId: "C62BB5D6-CE75-4C83-82DC-4148EF8CB1F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*", matchCriteriaId: "D32F1365-EAF8-4570-B2FF-45E47E8586F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*", matchCriteriaId: "DFD07F9B-6BB3-4423-8DBE-4E89A6478E65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*", matchCriteriaId: "34FE4F28-B704-4325-AE8A-C790163FEE71", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E832BC0C-8439-4779-9064-C2D93F231031", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*", matchCriteriaId: "27ACBA2A-87A7-4836-A474-AFD7D22F820D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*", matchCriteriaId: "C73E0B2E-BABF-4998-A1D7-4E803F9D78AD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*", matchCriteriaId: "59306ADF-FAA6-4970-ADFB-C5D9A5AEF1AD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*", matchCriteriaId: "959107AC-E9EC-467C-901B-A3164E3762E9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*", matchCriteriaId: "6F944F8F-0255-42BE-BD44-D21EC9F0FFC4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*", matchCriteriaId: "0F39C535-5A41-47CE-A9CF-B360998D4BF9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*", matchCriteriaId: "E9CEAEFC-7B82-41F9-A09D-C86A3A60A4FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*", matchCriteriaId: "40FAC31D-19C0-4BA0-A019-C7E7A0BA0B5B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*", matchCriteriaId: "6CAAFE0F-416F-4BCA-BA37-30EAEADA8AFE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA16A6D-2747-4DAC-A30A-166F1FD906FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*", matchCriteriaId: "289F9874-FC01-4809-9BDA-1AF583FB60B2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*", matchCriteriaId: "74EDFC67-E4EE-4D2C-BF9F-5881C987C662", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*", matchCriteriaId: "826869BE-4874-4BBA-9392-14851560BA10", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*", matchCriteriaId: "EF52D477-3045-45D1-9FD3-12F396266463", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*", matchCriteriaId: "88E310BF-F1F6-4124-A875-81967B9B531E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*", matchCriteriaId: "5B330F8F-F0DA-472C-A932-AD1D232C7DB5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1:*:*:*:*:*:*:*", matchCriteriaId: "BEE52F59-AABA-4069-A909-64AD5DFD2B18", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.5:*:*:*:*:*:*:*", matchCriteriaId: "20D7966E-B02B-48C8-BF96-723DD6C25314", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "4C230B8A-570D-4F58-83E1-AFA50B813EA4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "FD3F39CB-C4C2-4B13-94F0-9E44322314BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "59A71873-0EB2-418F-AE33-8474A1010FA5", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "F2A5530C-DF29-421B-9712-3454C1769446", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "41170977-FEEA-4B51-BF98-8493096CD691", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "B05791F9-0B31-4C4C-A9BA-9268CAA45FB2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "4D975CBA-7F01-4A4C-991B-9571410C4F07", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "B6D7AF29-4E08-4BFD-AFE0-994309E66F08", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "D2EFA476-5021-4A00-859E-1643009D6156", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*", matchCriteriaId: "E6E3A5DC-A237-46E4-A4E5-F135482F984A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.1:*:*:*:*:*:*:*", matchCriteriaId: "46A42D07-FF3E-41B4-BA39-3A5BDA4E0E61", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.3:*:*:*:*:*:*:*", matchCriteriaId: "3985EA37-2B77-45F2-ABA5-5CCC7B35CA2E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.4:*:*:*:*:*:*:*", matchCriteriaId: "67FB5ABE-3C40-4C58-B91F-0621C2180FAC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5:*:*:*:*:*:*:*", matchCriteriaId: "53909FD6-EC74-4D2F-99DA-26E70400B53F", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.1:*:*:*:*:*:*:*", matchCriteriaId: "55FE024D-0D43-40AD-9645-8C54ECF17824", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.5.2:*:*:*:*:*:*:*", matchCriteriaId: "EC411A8D-CD39-46F5-B8FC-6753E618FAEC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.7:*:*:*:*:*:*:*", matchCriteriaId: "D46E2E00-BA86-4002-B67B-2C1A6C1AAAE0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.6.7.1:*:*:*:*:*:*:*", matchCriteriaId: "91AD8BA2-EB8D-4D8B-B707-AF5C2A831998", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*", matchCriteriaId: "85F22403-B4EE-4303-9C94-915D3E0AC944", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "828E3DE1-B62E-4FEC-AAD3-EB0E452C9CBC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "596EC5DD-D7F4-44C8-B4B5-E2DC142FC486", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:6.7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "C356E0E6-5B87-40CF-996E-6FFEDFD82A31", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*", matchCriteriaId: "BBCA75A6-0A3E-4393-8884-9F3CE190641E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.0.1:*:*:*:*:*:*:*", matchCriteriaId: "3F3C12D3-7662-46C5-9E88-D1BE6CF605E0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "046B53A0-6BC1-461A-9C28-C534CE12C4BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.1.1:*:*:*:*:*:*:*", matchCriteriaId: "3CA889E1-4E8F-4ECE-88AC-7A240D5CBF0A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2:*:*:*:*:*:*:*", matchCriteriaId: "5D1C767F-3E06-43B7-A0CC-D51D97A053EB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.2.1:*:*:*:*:*:*:*", matchCriteriaId: "43A950B0-A7CA-4CE7-A393-A18C8C41B08E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.3:*:*:*:*:*:*:*", matchCriteriaId: "A7E221CB-BD0F-4AEE-8646-998B75647714", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.4:*:*:*:*:*:*:*", matchCriteriaId: "225382DE-2919-48F4-9CC0-DE685EAAFDF4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.0.5:*:*:*:*:*:*:*", matchCriteriaId: "FBA2DFE7-F478-46EC-9832-4B2C738FC879", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "D619BF54-1BA9-45D0-A876-92D7010088A0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "469EA365-DED5-4436-AAC2-5553529DE700", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "4D94F400-5A35-41F5-B37F-E9DA6F87ED8E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "5364CB94-BEA3-4E9A-A2F9-EE96A2D7F8AB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0:*:*:*:*:*:*:*", matchCriteriaId: "16FD5D12-CF1A-4990-99B3-1840EFBA5611", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "FCD2D11D-FF08-44E4-BF67-D8DD1E701FCD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.2.1:*:*:*:*:*:*:*", matchCriteriaId: "F788D156-1F1F-4A08-848B-257BC4CCE000", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.2.2:*:*:*:*:*:*:*", matchCriteriaId: "795ED164-7800-4D50-8E37-665BE30190D9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.2.3:*:*:*:*:*:*:*", matchCriteriaId: "1B0664B8-1670-4F47-A01E-089D05A9618A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.3.0:*:*:*:*:*:*:*", matchCriteriaId: "EBC0C3DC-4761-488A-90A9-6EA45EE61526", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.3.1:*:*:*:*:*:*:*", matchCriteriaId: "62EE065B-F8B6-4125-8486-B2EE0566B27A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:firepower_threat_defense:7.3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "5245DEF8-64BE-47C9-AA3C-DF3F7F92A89F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.", }, { lang: "es", value: "MĂşltiples vulnerabilidades en la funciĂłn de anulaciĂłn por usuario del software Cisco Adaptive Security Appliance (ASA) y el software Cisco Firepower Threat Defense (FTD) podrĂan permitir que un atacante remoto no autenticado omita una Lista de Control de Acceso (ACL) configurada y permita el tráfico que deberĂa se le negará el flujo a travĂ©s de un dispositivo afectado. Estas vulnerabilidades se deben a un error lĂłgico que podrĂa ocurrir cuando el software afectado construye y aplica reglas de anulaciĂłn por usuario. Un atacante podrĂa aprovechar estas vulnerabilidades conectándose a una red a travĂ©s de un dispositivo afectado que tenga una configuraciĂłn vulnerable. Un exploit exitoso podrĂa permitir al atacante omitir la ACL de la interfaz y acceder a recursos que deberĂan estar protegidos.", }, ], id: "CVE-2023-20256", lastModified: "2024-01-25T17:15:41.643", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 1.4, source: "ykramarz@cisco.com", type: "Secondary", }, ], }, published: "2023-11-01T17:15:11.717", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-290", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, ], }, }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.