Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control List Bypass Vulnerability
A vulnerability in Cisco Secure Firewall ASA and FTD software allows an unauthenticated remote attacker to bypass access control lists (ACLs) and send traffic through the firewall that should be denied. The flaw occurs due to improper error handling during cluster join operations when the device runs low on memory while replicating ACL rules. An attacker could exploit this by sending traffic to protected networks that the firewall should block, potentially reaching control systems, RTUs, PLCs, historian databases, or engineering workstations behind the firewall. Cisco has released software updates that address this vulnerability. There are no workarounds available.
- Network access to the firewall from the internet or untrusted network
- Target firewall must be actively joining a cluster
- Device must experience memory pressure during ACL replication
Patching may require device reboot — plan for process interruption
/api/v1/advisories/82850c02-28bb-4ce0-8528-58e745d8c8e5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.