CVE-2021-34794 (CNNVD-202110-1964)
中文标题:
Cisco Firepower Threat Defense 安全漏洞
英文标题:
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SNMP Access Control Vulnerability
漏洞描述
中文描述:
Cisco Firepower Threat Defense(FTD)是美国思科(Cisco)公司的一套提供下一代防火墙服务的统一软件。 Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)存在安全漏洞,该漏洞源于访问控制无效。攻击者可以通过从 SNMPv3 访问控制列表不允许的主机向受影响的设备发送 SNMPv3 查询来利用此漏洞。成功的利用可能允许攻击者向受影响的设备发送 SNMP 查询并从设备中检索信息。攻击者需要有效凭据才能执行 SNMP 查询。
英文描述:
A vulnerability in the Simple Network Management Protocol version 3 (SNMPv3) access control functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to query SNMP data. This vulnerability is due to ineffective access control. An attacker could exploit this vulnerability by sending an SNMPv3 query to an affected device from a host that is not permitted by the SNMPv3 access control list. A successful exploit could allow the attacker to send an SNMP query to an affected device and retrieve information from the device. The attacker would need valid credentials to perform the SNMP query.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_adaptive_security_appliance_(asa)_software:n_a:*:*:*:*:*:*:*
|
| cisco | firepower_threat_defense | * | - | - |
cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
|
| cisco | adaptive_security_appliance_software | * | - | - |
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5512-x_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5512-x_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5505_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5505_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5515-x_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5515-x_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5525-x_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5525-x_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5545-x_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5545-x_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5555-x_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5555-x_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5580_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5580_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 009.014\(001\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:009.014\(001\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 099.015\(001.033\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:099.015\(001.033\):*:*:*:*:*:*:*
|
| cisco | asa_5585-x_firmware | 099.016\(001.216\) | - | - |
cpe:2.3:o:cisco:asa_5585-x_firmware:099.016\(001.216\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-34794 |
2025-11-11 15:21:00 | 2025-11-11 07:36:55 |
| NVD | nvd_CVE-2021-34794 |
2025-11-11 14:57:44 | 2025-11-11 07:45:13 |
| CNNVD | cnnvd_CNNVD-202110-1964 |
2025-11-11 15:10:44 | 2025-11-11 07:56:57 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202110-1964
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 27
- data_sources: ['cve'] -> ['cve', 'nvd']