CVE-2021-34753

5.8 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to bypass Cisco Firepower Threat Defense security rules for Ethernet Industrial Protocol traffic by sending specially crafted ENIP packets. It affects Cisco FTD software due to incomplete deep packet inspection processing. Organizations using Cisco FTD with ENIP traffic inspection enabled are vulnerable.

💻 Affected Systems

Products:
  • Cisco Firepower Threat Defense (FTD) Software
Versions: Versions prior to 6.6.5.2, 6.7.0.2, and 7.0.0
Operating Systems: Cisco FTD OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when ENIP traffic inspection is configured and enabled. Systems not processing ENIP traffic are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass all configured access control and intrusion policies for ENIP traffic, potentially allowing unauthorized access to industrial control systems or critical infrastructure.

🟠

Likely Case

Attackers bypass specific security rules for ENIP traffic, potentially allowing unauthorized communication with industrial devices that should be blocked.

🟢

If Mitigated

With proper network segmentation and defense-in-depth, impact is limited to ENIP traffic only, preventing broader network compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted ENIP packets to vulnerable interfaces. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.6.5.2, 6.7.0.2, or 7.0.0 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP

Restart Required: Yes

Instructions:

1. Download appropriate patch from Cisco Software Center. 2. Upload to FTD management center. 3. Deploy update to affected devices. 4. Restart devices as required.

🔧 Temporary Workarounds

Disable ENIP Inspection

all

Temporarily disable ENIP traffic inspection if not required

Configure via FMC: Devices > Device Management > Access Control > Edit Policy > Disable ENIP inspection rules

Network Segmentation

all

Isolate ENIP traffic to separate VLANs with additional firewall controls

🧯 If You Can't Patch

  • Implement strict network segmentation for ENIP traffic
  • Deploy additional layer of firewall protection for industrial control network segments

🔍 How to Verify

Check if Vulnerable:

Check FTD version via CLI: 'show version' and compare to affected versions. Verify ENIP inspection is configured.

Check Version:

show version

Verify Fix Applied:

After patching, verify version shows 6.6.5.2, 6.7.0.2, or 7.0.0+. Test ENIP traffic inspection functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected ENIP traffic bypassing configured rules
  • ENIP packets from unauthorized sources

Network Indicators:

  • Crafted ENIP packets with unusual structure
  • ENIP traffic to/from unexpected IP addresses

SIEM Query:

source:ftd AND (event_type:bypass OR protocol:enip) AND action:allowed WHERE rule_action:block

🔗 References

📤 Share & Export