5.3
CVE-2021-34790
- EPSS 0.47%
- Published 27.10.2021 19:15:08
- Last modified 21.11.2024 06:11:12
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Version < 9.8.4.40
Cisco ≫ Firepower Threat Defense Version < 6.4.0.12
Cisco ≫ Firepower Threat Defense Version >= 6.5.0 < 6.6.5
Cisco ≫ Firepower Threat Defense Version >= 6.7.0 < 6.7.0.2
Cisco ≫ Adaptive Security Appliance Software Version >= 9.12.0 < 9.12.4.29
Cisco ≫ Adaptive Security Appliance Software Version >= 9.13.0 < 9.14.2.15
Cisco ≫ Adaptive Security Appliance Software Version >= 9.15.0 < 9.15.1.15
Cisco ≫ Asa 5512-x Firmware Version009.008
Cisco ≫ Asa 5512-x Firmware Version009.015
Cisco ≫ Asa 5505 Firmware Version009.008
Cisco ≫ Asa 5505 Firmware Version009.015
Cisco ≫ Asa 5515-x Firmware Version009.008
Cisco ≫ Asa 5515-x Firmware Version009.015
Cisco ≫ Asa 5525-x Firmware Version009.008
Cisco ≫ Asa 5525-x Firmware Version009.015
Cisco ≫ Asa 5545-x Firmware Version009.008
Cisco ≫ Asa 5545-x Firmware Version009.015
Cisco ≫ Asa 5555-x Firmware Version009.008
Cisco ≫ Asa 5555-x Firmware Version009.015
Cisco ≫ Asa 5580 Firmware Version009.008
Cisco ≫ Asa 5580 Firmware Version009.015
Cisco ≫ Asa 5585-x Firmware Version009.008
Cisco ≫ Asa 5585-x Firmware Version009.015
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.47% | 0.616 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
psirt@cisco.com | 4.7 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-358 Improperly Implemented Security Check for Standard
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.