A vulnerability in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. This vulnerability is due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit this vulnerability by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should trigger and drop for the ENIP packet.
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco firepower Threat Defense Software
CPEs cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco firepower Threat Defense Software
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. This vulnerability is due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit this vulnerability by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should trigger and drop for the ENIP packet.
Title Cisco Firepower Threat Defense Ethernet Industrial Protocol Policy Bypass Vulnerabilities
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-11-15T16:14:45.327Z

Updated: 2024-11-15T18:06:40.214Z

Reserved: 2021-06-15T13:43:49.943Z

Link: CVE-2021-34753

cve-icon Vulnrichment

Updated: 2024-11-15T18:06:22.543Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-15T17:15:10.303

Modified: 2024-11-18T17:11:56.587

Link: CVE-2021-34753

cve-icon Redhat

No data.