Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability
A vulnerability in the SSH key-based authentication implementation in Cisco Secure Firewall ASA Software allows an unauthenticated attacker to log in to affected devices without possessing the actual private SSH key. The flaw is due to insufficient validation of user input during SSH authentication. An attacker needs only a valid username and the associated public key to bypass authentication and execute commands as that user. This affects all versions of Firepower 2100, 1000, 3000 ISA, 9000, 4100 Series and ASAv, as well as Secure Firewall 3100, 4200, and 1200 Series appliances. The vulnerability does not grant root access, and the AAA auto-enable command is not affected.
- Network access to SSH port 22 on the firewall
- Knowledge of a valid username on the firewall
- Access to the public SSH key of that user
Patching may require device reboot — plan for process interruption
/api/v1/advisories/df7d21c3-418d-457d-ac14-98822f1c298dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.