Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.
                
            Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Changed
Confidentiality Impact None
Integrity Impact Low
Availability Impact None
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
Exploitation none
Automatable no
Technical Impact partial
Affected Vendors & Products
| Vendors | Products | 
|---|---|
| Cisco | 
 | 
Configuration 1 [-]
| 
 | 
Configuration 2 [-]
| 
 | 
No data.
References
        History
                    Thu, 21 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: cisco
Published: 2023-11-01T16:54:53.004Z
Updated: 2024-11-21T21:44:44.427Z
Reserved: 2022-10-27T18:47:50.372Z
Link: CVE-2023-20256
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T09:05:36.885Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-11-01T17:15:11.717
Modified: 2024-11-21T07:41:00.497
Link: CVE-2023-20256
 Redhat
                        Redhat
                    No data.