#VU57796 Improperly implemented security check for standard in Cisco Adaptive Security Appliance (ASA) and Cisco Firewall Threat Defense (FTD) - CVE-2021-34790
Published: October 29, 2021
Vulnerability identifier: #VU57796
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-34790
CWE-ID: CWE-358
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Cisco Adaptive Security Appliance (ASA)
Cisco Firewall Threat Defense (FTD)
Cisco Adaptive Security Appliance (ASA)
Cisco Firewall Threat Defense (FTD)
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient traffic validation within the Session Initiation Protocol (SIP) Application Level Gateway (ALG) for the Network Address Translation (NAT) feature. A remote attacker can send a specially crafted SIP traffic, open unauthorized connections to the remote host and undertake actions leveraging that host.
Remediation
Install updates from vendor's website.