Lucene search

K
ciscoCiscoCISCO-SA-20140409-ASA
HistoryApr 09, 2014 - 4:00 p.m.

Multiple Vulnerabilities in Cisco ASA Software

2014-04-0916:00:00
tools.cisco.com
685

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.972 High

EPSS

Percentile

99.8%

Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA ASDM Privilege Escalation Vulnerability
Cisco ASA SSL VPN Privilege Escalation Vulnerability
Cisco ASA SSL VPN Authentication Bypass Vulnerability
Cisco ASA SIP Denial of Service Vulnerability 

These vulnerabilities are independent of one another; a release that is
affected by one of the vulnerabilities may not be affected by the
others.

Successful exploitation of the Cisco ASA ASDM Privilege Escalation Vulnerability and the Cisco ASA SSL VPN Privilege Escalation Vulnerability may allow an attacker or an unprivileged user to elevate privileges and gain administrative access to the affected system.

Successful exploitation of the Cisco ASA SSL VPN Authentication Bypass Vulnerability may allow an attacker to obtain unauthorized access to the internal network via SSL VPN.

Successful exploitation of the Cisco ASA SIP Denial of Service Vulnerability may cause the exhaustion of available memory. This may cause system
instability and in some cases lead to a reload of the affected system,
creating a denial of service (DoS) condition.

Cisco has released software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available for some of the vulnerabilities.
This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa”]

Note: This security advisory does not provide information about
the OpenSSL TLS Heartbeat Read Overrun Vulnerability identified by CVE-2014-0160 (also known as Heartbleed). For additional information regarding Cisco products affected by this vulnerability, refer to the Cisco Security Advisory at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed”]

Affected configurations

Vulners
Node
ciscoadaptive_security_appliance_softwareMatch8.0
OR
ciscoadaptive_security_appliance_softwareMatch8.2
OR
ciscoadaptive_security_appliance_softwareMatch8.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4
OR
ciscoadaptive_security_appliance_softwareMatch8.6
OR
ciscoadaptive_security_appliance_softwareMatch8.7
OR
ciscoadaptive_security_appliance_softwareMatch9.0
OR
ciscoadaptive_security_appliance_softwareMatch9.1
OR
ciscoadaptive_security_appliance_softwareMatch8.0.2.11
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3
OR
ciscoadaptive_security_appliance_softwareMatch8.0.2
OR
ciscoadaptive_security_appliance_softwareMatch8.0.1.2
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.25
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.28
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.33
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.32
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5
OR
ciscoadaptive_security_appliance_softwareMatch8.0.2.15
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3.6
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3.12
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3.19
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.3
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.9
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.16
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.23
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.31
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.20
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.23
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.25
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.27
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.28
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.31
OR
ciscoadaptive_security_appliance_softwareMatch8.2.0.45
OR
ciscoadaptive_security_appliance_softwareMatch8.2.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.10
OR
ciscoadaptive_security_appliance_softwareMatch8.2.3
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4
OR
ciscoadaptive_security_appliance_softwareMatch8.2.1.11
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.9
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.12
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.16
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4.4
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.13
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.22
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.26
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.17
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.33
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.40
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.41
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.46
OR
ciscoadaptive_security_appliance_softwareMatch8.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.15
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.16
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.19
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.23
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.24
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.50
OR
ciscoadaptive_security_appliance_softwareMatch8.1.1.6
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.13
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.49
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.55
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.56
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.23
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.25
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.4
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.6
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.4
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.13
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.31
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.33
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.34
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.37
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.39
OR
ciscoadaptive_security_appliance_softwareMatch8.4.1
OR
ciscoadaptive_security_appliance_softwareMatch8.4.2
OR
ciscoadaptive_security_appliance_softwareMatch8.4.1.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4.1.11
OR
ciscoadaptive_security_appliance_softwareMatch8.4.2.8
OR
ciscoadaptive_security_appliance_softwareMatch8.4.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4.3.8
OR
ciscoadaptive_security_appliance_softwareMatch8.4.3.9
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.1
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.5
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.9
OR
ciscoadaptive_security_appliance_softwareMatch8.4.5
OR
ciscoadaptive_security_appliance_softwareMatch8.4.5.6
OR
ciscoadaptive_security_appliance_softwareMatch8.4.6
OR
ciscoadaptive_security_appliance_softwareMatch8.4.2.1
OR
ciscoadaptive_security_appliance_softwareMatch8.4.7
OR
ciscoadaptive_security_appliance_softwareMatch8.4.7.3
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.2
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.5
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.10
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.12
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1.3
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1.4
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1.7
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1.8
OR
ciscoadaptive_security_appliance_softwareMatch9.0.1
OR
ciscoadaptive_security_appliance_softwareMatch9.0.2
OR
ciscoadaptive_security_appliance_softwareMatch9.0.2.10
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3.6
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3.8
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1.4
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2
OR
ciscoadaptive_security_appliance_softwareMatch9.1.3
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2.8
OR
ciscoadaptive_security_appliance_softwareMatch9.1.3.2
OR
ciscoadaptive_security_appliance_softwareMatch9.1.4

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.972 High

EPSS

Percentile

99.8%