8.6
CVE-2021-34749
- EPSS 0.23%
- Published 18.08.2021 20:15:07
- Last modified 26.11.2024 16:09:02
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Ironport Web Security Appliance Version14.5
Cisco ≫ Secure Firewall Management Center Version2.9.18
Cisco ≫ Firepower Management Center Virtual Appliance Firmware Version6.6.0
Cisco ≫ Firepower Management Center Virtual Appliance Firmware Version6.7.0
Cisco ≫ Firepower Management Center Virtual Appliance Firmware Version7.0.0
Cisco ≫ Firepower Management Center Virtual Appliance Firmware Version7.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.23% | 0.461 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
psirt@cisco.com | 5.8 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.