CVE-2021-34791
Cisco Adaptive Security Appliance (ASA) vulnerability analysis and mitigation

Overview

CVE-2021-34791 is a vulnerability in the File Transfer Protocol (FTP) Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software. This vulnerability was publicly disclosed on October 27, 2021, and has been discussed as part of NAT Slipstreaming attacks. The vulnerability affects Cisco ASA Software and Cisco FTD Software, with the FTP ALG being enabled by default (Cisco Advisory).

Technical details

The vulnerability is caused by insufficient traffic validation for the FTP ALG. It has been assigned a CVSS Base Score of 4.7 with the vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N. The vulnerability is tracked under Cisco Bug ID CSCvx50914 and has been classified with CWE-358. The FTP ALG is enabled by default in the affected software versions (Cisco Advisory).

Impact

A successful exploitation of this vulnerability could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. This could enable the attacker to undertake actions leveraging the compromised host (Cisco Advisory).

Mitigation and workarounds

While there are no direct workarounds for this vulnerability, Cisco has released software updates that address the issue. As a mitigation, customers who do not need the FTP ALG can disable it to reduce the attack surface. This can be accomplished from the CLI for Cisco ASA Software or by using FlexConfig for Cisco FTD Software. Fixed versions include ASA Software 9.8.4.40, 9.12.4.18, 9.14.2.15, 9.15.1.15, and FTD Software 6.4.0.12, 6.6.5, 6.7.0.2 (Cisco Advisory).

Community reactions

The vulnerability was discovered through public discussion of NAT Slipstreaming attacks, indicating significant attention from the security research community (Cisco Advisory).

Additional resources


SourceThis report was generated using AI

Related Cisco Adaptive Security Appliance (ASA) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20333CRITICAL9.9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
YesYesSep 25, 2025
CVE-2025-20363CRITICAL9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoYesSep 25, 2025
CVE-2025-20362HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
YesYesSep 25, 2025
CVE-2025-20263HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoYesAug 14, 2025
CVE-2025-20254MEDIUM5.8
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoYesAug 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management