A vulnerability in the Border Gateway Protocol (BGP) Bidirectional Forwarding Detection (BFD) implementation of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to bypass the access control list (ACL) for specific TCP and UDP traffic. More Information: CSCvc68229. Known Affected Releases: 9.6(2). Known Fixed Releases: 99.1(20.1) 99.1(10.2) 98.1(12.7) 98.1(1.49) 97.1(6.58) 97.1(0.134) 96.2(0.109) 9.7(1.1) 9.6(2.99) 9.6(2.8).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96926 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038051 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-asa | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/96926 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038051 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-asa | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/96926 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038051 - | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-asa - Mitigation, Vendor Advisory |
15 Aug 2023, 18:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:* |
15 Aug 2023, 15:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.6.2.9:*:*:*:*:*:*:* |
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.8:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.9:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:* |
11 Aug 2023, 18:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:6.3.1:*:*:*:*:*:*:* |
Information
Published : 2017-03-17 22:59
Updated : 2024-11-21 03:26
NVD link : CVE-2017-3867
Mitre link : CVE-2017-3867
CVE.ORG link : CVE-2017-3867
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_software
CWE
CWE-287
Improper Authentication