A vulnerability in the management access list configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to bypass a configured management interface access list on an affected system. The vulnerability is due to the configuration of different management access lists, with ports allowed in one access list and denied in another. An attacker could exploit this vulnerability by sending crafted remote management traffic to the local IP address of an affected system. A successful exploit could allow the malicious user to bypass the configured management access list policies, and traffic to the management interface would not be properly denied.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco firepower threat defense |
||
cisco asa_5505_firmware 9.12\\(1.6\\) |
||
cisco asa_5505_firmware 201.5\\(23.16\\) |
||
cisco asa_5510_firmware 9.12\\(1.6\\) |
||
cisco asa_5510_firmware 201.5\\(23.16\\) |
||
cisco asa_5512-x_firmware 9.12\\(1.6\\) |
||
cisco asa_5512-x_firmware 201.5\\(23.16\\) |
||
cisco asa_5515-x_firmware 9.12\\(1.6\\) |
||
cisco asa_5515-x_firmware 201.5\\(23.16\\) |
||
cisco asa_5520_firmware 9.12\\(1.6\\) |
||
cisco asa_5520_firmware 201.5\\(23.16\\) |
||
cisco asa_5525-x_firmware 9.12\\(1.6\\) |
||
cisco asa_5525-x_firmware 201.5\\(23.16\\) |
||
cisco asa_5540_firmware 9.12\\(1.6\\) |
||
cisco asa_5540_firmware 201.5\\(23.16\\) |
||
cisco asa_5545-x_firmware 9.12\\(1.6\\) |
||
cisco asa_5545-x_firmware 201.5\\(23.16\\) |
||
cisco asa_5550_firmware 9.12\\(1.6\\) |
||
cisco asa_5550_firmware 201.5\\(23.16\\) |
||
cisco asa_5555-x_firmware 9.12\\(1.6\\) |
||
cisco asa_5555-x_firmware 201.5\\(23.16\\) |
||
cisco asa_5580_firmware 9.12\\(1.6\\) |
||
cisco asa_5580_firmware 201.5\\(23.16\\) |
||
cisco asa_5585-x_firmware 9.12\\(1.6\\) |
||
cisco asa_5585-x_firmware 201.5\\(23.16\\) |