{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T18:29:45.107","vulnerabilities":[{"cve":{"id":"CVE-2021-34749","sourceIdentifier":"psirt@cisco.com","published":"2021-08-18T20:15:07.930","lastModified":"2024-11-26T16:09:02.407","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks."},{"lang":"es","value":"Una vulnerabilidad en el filtrado de peticiones Server Name Identification (SNI) de Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD) y Snort detection engine podría permitir a un atacante no autenticado remoto omitir la tecnología de filtrado en un dispositivo afectado y exfiltrar datos de un host comprometido. Esta vulnerabilidad es debido a un filtrado inadecuado del handshake SSL. Un atacante podría explotar esta vulnerabilidad al usar los datos del paquete de bienvenida del cliente SSL para comunicarse con un servidor externo. Una explotación con éxito podría permitir al atacante ejecutar un ataque de comando y control en un host comprometido y llevar a cabo ataques adicionales de exfiltración de datos."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:ironport_web_security_appliance:14.5:*:*:*:*:*:*:*","matchCriteriaId":"4016409A-673A-43E8-AE5F-DE6088CC35B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.18:*:*:*:*:*:*:*","matchCriteriaId":"80AD91C6-B7E3-48AC-8A51-3C05FE2659AB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:6.6.0:*:*:*:*:*:*:*","matchCriteriaId":"86D052F5-7C8C-4012-A820-0182DA058585"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:6.7.0:*:*:*:*:*:*:*","matchCriteriaId":"EAECA338-DB26-4422-ACF9-2C459940900E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"8BDF6775-C4E7-4F60-9492-374DE04E6681"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_management_center_virtual_appliance_firmware:7.1.0:*:*:*:*:*:*:*","matchCriteriaId":"303C8C86-E705-476F-B21B-AF6876EE0A56"}]}]}],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"psirt@cisco.com"},{"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.debian.org/security/2023/dsa-5354","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}