2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-34791" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2021-10-27T19:15:08.457" ,
2023-08-16 18:00:38 +00:00
"lastModified" : "2023-08-16T16:17:07.960" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Analyzed" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming."
} ,
{
"lang" : "es" ,
"value" : "Varias vulnerabilidades en la Puerta de Enlace de Nivel de Aplicaci\u00f3n (ALG) para la funcionalidad Network Address Translation (NAT) del software Cisco Adaptive Security Appliance (ASA) y el software Firepower Threat Defense (FTD) podr\u00edan permitir a un atacante remoto no autenticado omitir la ALG y abrir conexiones no autorizadas con un host situado detr\u00e1s de la ALG. Para conseguir m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso. Nota: Estas vulnerabilidades se han discutido p\u00fablicamente como NAT Slipstreaming"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
] ,
"cvssMetricV30" : [
{
"source" : "ykramarz@cisco.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
} ,
{
"source" : "ykramarz@cisco.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-358"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "9.8.4.40" ,
"matchCriteriaId" : "8C7F329B-4EF5-411A-9AB6-02E6A4162D6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.4.0.12" ,
"matchCriteriaId" : "FAE65CB5-08E5-41B6-9AC0-02451C90E833"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.0" ,
"versionEndExcluding" : "6.6.5" ,
"matchCriteriaId" : "18589C74-19D2-44F0-AF26-68910E26655D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.7.0" ,
"versionEndExcluding" : "6.7.0.2" ,
"matchCriteriaId" : "FDDF492B-BC61-4814-B05F-3F6CD07080F7"
2023-08-16 18:00:38 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "9.12.0" ,
"versionEndExcluding" : "9.12.4.18" ,
"matchCriteriaId" : "FE618915-7057-4229-9672-0BCE77B6F67C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "9.13.0" ,
"versionEndExcluding" : "9.14.2.15" ,
"matchCriteriaId" : "185792EB-E12D-4ABD-938F-68EB7F65FA3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "9.15.0" ,
"versionEndExcluding" : "9.15.1.15" ,
"matchCriteriaId" : "D6DA106A-A2D9-4F9F-AF9B-88F67A8589FC"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5512-x_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C8EAF9E-15BB-4565-A131-B0B3F9E98B50"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5512-x_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D81100E4-D5B3-4953-9EB3-A4335A96B0FC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08F0F160-DAD2-48D4-B7B2-4818B2526F35"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5505_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "446D3F11-4E33-417E-8BC5-A0ADA2336748"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5505_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF62190B-96EE-4295-BF8B-5A8F65876979"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5515-x_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "649BB8A1-7665-4312-9D34-8823CD8031B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5515-x_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2008D416-C0D8-41DB-9088-553665643A4D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "977D597B-F6DE-4438-AB02-06BE64D71EBE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5525-x_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D4DC944-D1C0-400F-92A2-852BED71210C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5525-x_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CB81E9A-3CFF-406A-83D3-A62A650D1583"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB71EB29-0115-4307-A9F7-262394FD9FB0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5545-x_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F1951B0-E631-475B-9AC2-DD3EFC842D37"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5545-x_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5054127-B933-4FBB-87D9-F90168ADE8A7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57179F60-E330-4FF0-9664-B1E4637FF210"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5555-x_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FCA70F5-B62E-449E-BFB5-FE52039A43CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5555-x_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "603C4110-1A74-4698-9882-F23FF05803BE"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5535C936-391B-4619-AA03-B35265FC15D7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5580_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6B105A6-008E-46E4-8789-C718962C1F46"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5580_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FB5240E-52F4-4A1E-8B5B-25A6446A2BF9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5585-x_firmware:009.008:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C662CBD3-FA7F-4BD4-8867-9796B38926A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:asa_5585-x_firmware:009.015:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1234B4DC-4C8E-48B5-BD05-01843C8083D5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16AE20C2-C77E-4E04-BF13-A48696E52426"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
}
]
}