3 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 0

A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability. Una vulnerabilidad en el Cisco ASA , podría permitir a atacantes remotos una autenticación con éxito usando el cliente Cisco AnyConnect VPN si el tipo Secondary Authentication es LDAP y la contraseña se deja en blanco, siempre que las credenciales principales sean correctas. Estas vulnerabilidades son debido a una comprobación de entrada inapropiada de determinados parámetros pasados ?? • https://quickview.cloudapps.cisco.com/quickview/bug/CSCtq58884 • CWE-287: Improper Authentication •

CVSS: 7.2EPSS: 0%CPEs: 211EXPL: 0

A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. • http://www.securityfocus.com/bid/108350 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot https://www.kb.cert.org/vuls/id/400865 https://www.us-cert.gov/ics/advisories/icsa-20-072-03 • CWE-284: Improper Access Control CWE-667: Improper Locking •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

The HTTPS inspection engine in the Content Security and Control Security Services Module (CSC-SSM) 6.6 before 6.6.1164.0 for Cisco ASA 5500 devices allows remote attackers to cause a denial of service (memory consumption or device reload) via a flood of HTTPS packets, aka Bug ID CSCue76147. El motor de inspección HTTPS en Content Security y Control Security Services Module (CSC-SSM) 6.6 en versiones anteriores a 6.6.1164.0 para dispositivos Cisco ASA 5500 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria o recarga de dispositivo) a través de una inundación de paquetes HTTPS, también conocida como Bug ID CSCue76147. • http://www.securityfocus.com/bid/84281 http://www.securitytracker.com/id/1035230 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-csc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-399: Resource Management Errors •