Lucene search

K
ciscoCiscoCISCO-SA-20140221-CVE-2014-0739
HistoryFeb 21, 2014 - 3:43 p.m.

Cisco Adaptive Security Appliance Phone Proxy sec_db Race Condition Vulnerability

2014-02-2115:43:42
tools.cisco.com
20

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

49.3%

A vulnerability in the TFTP request function of the Phone Proxy feature of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to pass traffic from an untrusted phone through the ASA.

The vulnerability is due to a limitation in processing the TFTP request for a configuration file. An attacker could exploit this vulnerability by sending a crafted TFTP request for a phone configuration file. An exploit could allow the attacker to pass traffic from an untrusted phone through the ASA.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

Cisco indicates through the CVSS score that proof-of-concept exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoadaptive_security_appliance_softwareMatch9.1
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1.4
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2
OR
ciscoadaptive_security_appliance_softwareMatch9.1.3
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2.8

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

49.3%

Related for CISCO-SA-20140221-CVE-2014-0739