Cisco Adaptive Security Appliance Software Identity-Based Rule Bypass (cisco-sa-asaftd-rule-bypass-ejjOgQEY)

medium Nessus Plugin ID 154828

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco ASA Software is affected by a vulnerability. Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvx47895

See Also

http://www.nessus.org/u?7905c3c5

https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74773

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx47895

Plugin Details

Severity: Medium

ID: 154828

File Name: cisco-sa-asaftd-rule-bypass-ejjOgQEY-asa.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 11/2/2021

Updated: 3/31/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2021-34787

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:adaptive_security_appliance_software

Required KB Items: Host/Cisco/ASA/model

Exploit Ease: No known exploits are available

Patch Publication Date: 10/27/2021

Vulnerability Publication Date: 10/27/2021

Reference Information

CVE: CVE-2021-34787

CWE: 183

CISCO-SA: cisco-sa-asaftd-rule-bypass-ejjOgQEY

IAVA: 2021-A-0526-S

CISCO-BUG-ID: CSCvx47895