Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-34790 CVE-2021-34791 |
CWE-ID | CWE-358 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco Adaptive Security Appliance (ASA) Hardware solutions / Security hardware applicances Cisco Firepower Threat Defense (FTD) Hardware solutions / Security hardware applicances |
Vendor | Cisco Systems, Inc |
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU57796
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-34790
CWE-ID:
CWE-358 - Improperly Implemented Security Check for Standard
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient traffic validation within the Session Initiation Protocol (SIP) Application Level Gateway (ALG) for the Network Address Translation (NAT) feature. A remote attacker can send a specially crafted SIP traffic, open unauthorized connections to the remote host and undertake actions leveraging that host.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCisco Adaptive Security Appliance (ASA): 9.8 - 9.15
Cisco Firepower Threat Defense (FTD): 6.2.2, 6.2.3, 6.3.0, 6.4.0, 6.5.0, 6.6.0, 6.7.0
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU57797
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-34791
CWE-ID:
CWE-358 - Improperly Implemented Security Check for Standard
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient traffic validation within the File Transfer Protocol (FTP) Application Level Gateway (ALG) for the Network Address Translation (NAT) feature. A remote attacker can send a specially crafted FTP traffic, open unauthorized connections to the remote host and undertake actions leveraging that host.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCisco Adaptive Security Appliance (ASA): 9.8 - 9.15
Cisco Firepower Threat Defense (FTD): 6.2.2, 6.2.3, 6.3.0, 6.4.0, 6.5.0, 6.6.0, 6.7.0
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?