Lucene search

K
nvd[email protected]NVD:CVE-2021-34791
HistoryOct 27, 2021 - 7:15 p.m.

CVE-2021-34791

2021-10-2719:15:08
CWE-20
CWE-358
web.nvd.nist.gov
6
cisco
asa
ftd
nat
alg
vulnerabilities
network address translation
nat slipstreaming

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

48.2%

Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.

Affected configurations

Nvd
Node
ciscoadaptive_security_applianceRange<9.8.4.40
OR
ciscofirepower_threat_defenseRange<6.4.0.12
OR
ciscofirepower_threat_defenseRange6.5.06.6.5
OR
ciscofirepower_threat_defenseRange6.7.06.7.0.2
OR
ciscoadaptive_security_appliance_softwareRange9.12.09.12.4.18
OR
ciscoadaptive_security_appliance_softwareRange9.13.09.14.2.15
OR
ciscoadaptive_security_appliance_softwareRange9.15.09.15.1.15
Node
ciscoasa_5512-x_firmwareMatch009.008
OR
ciscoasa_5512-x_firmwareMatch009.015
AND
ciscoasa_5512-xMatch-
Node
ciscoasa_5505_firmwareMatch009.008
OR
ciscoasa_5505_firmwareMatch009.015
AND
ciscoasa_5505Match-
Node
ciscoasa_5515-x_firmwareMatch009.008
OR
ciscoasa_5515-x_firmwareMatch009.015
AND
ciscoasa_5515-xMatch-
Node
ciscoasa_5525-xMatch-
AND
ciscoasa_5525-x_firmwareMatch009.008
OR
ciscoasa_5525-x_firmwareMatch009.015
Node
ciscoasa_5545-xMatch-
AND
ciscoasa_5545-x_firmwareMatch009.008
OR
ciscoasa_5545-x_firmwareMatch009.015
Node
ciscoasa_5555-xMatch-
AND
ciscoasa_5555-x_firmwareMatch009.008
OR
ciscoasa_5555-x_firmwareMatch009.015
Node
ciscoasa_5580Match-
AND
ciscoasa_5580_firmwareMatch009.008
OR
ciscoasa_5580_firmwareMatch009.015
Node
ciscoasa_5585-xMatch-
AND
ciscoasa_5585-x_firmwareMatch009.008
OR
ciscoasa_5585-x_firmwareMatch009.015
VendorProductVersionCPE
ciscoadaptive_security_appliance*cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*
ciscofirepower_threat_defense*cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software*cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
ciscoasa_5512-x_firmware009.008cpe:2.3:o:cisco:asa_5512-x_firmware:009.008:*:*:*:*:*:*:*
ciscoasa_5512-x_firmware009.015cpe:2.3:o:cisco:asa_5512-x_firmware:009.015:*:*:*:*:*:*:*
ciscoasa_5512-x-cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*
ciscoasa_5505_firmware009.008cpe:2.3:o:cisco:asa_5505_firmware:009.008:*:*:*:*:*:*:*
ciscoasa_5505_firmware009.015cpe:2.3:o:cisco:asa_5505_firmware:009.015:*:*:*:*:*:*:*
ciscoasa_5505-cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*
ciscoasa_5515-x_firmware009.008cpe:2.3:o:cisco:asa_5515-x_firmware:009.008:*:*:*:*:*:*:*
Rows per page:
1-10 of 271

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

48.2%

Related for NVD:CVE-2021-34791