26 results (0.019 seconds)

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

The remote-access IPSec VPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices, PIX Security Appliances 500 series devices, and VPN Concentrators 3000 series devices responds to an Aggressive Mode IKE Phase I message only when the group name is configured on the device, which allows remote attackers to enumerate valid group names via a series of IKE negotiation attempts, aka Bug ID CSCtj96108, a different vulnerability than CVE-2005-2025. La implementación del acceso remoto de IPSec VPN en las series de dispositivos Cisco Adaptive Security Appliances (ASA) 5500, PIX Security Appliances 500 , y concentradores VPN 3000 responden a un mensaje 'Aggressive Mode IKE Phase I' sólo cuando el nombre del grupo está configurado en el dispositivo, lo que permite enumerar los nombres válidos de grupo a atacantes remotos a través de una serie de intentos de negociación IKE. Este fallo también conocido como ID CSCtj96108. Se trata de una vulnerabilidad diferente a CVE-2005-2025. • http://www.cisco.com/en/US/products/products_security_response09186a0080b5992c.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 9%CPEs: 11EXPL: 0

Multiple unspecified vulnerabilities in Cisco VPN 3000 series concentrators before 4.1, 4.1.x up to 4.1(7)L, and 4.7.x up to 4.7(2)F allow attackers to execute the (1) CWD, (2) MKD, (3) CDUP, (4) RNFR, (5) SIZE, and (6) RMD FTP commands to modify files or create and delete directories via unknown vectors. Múltiples vulnerabilidades no especificadas en los concentradores de la serie Cisco VPN 3000 anteriores a 4.1, 4.1.x hasta 4.1(7)L, y 4.7.x hasta 4.7(2)F permiten a atacantes ejecutar los comandos (1) CWD, (2) MKD, (3) CDUP, (4) RNFR, (5) SIZE, y (6) RMD FTP para modificar archivos o crear y borrar directorios a través de vectores no especificados. • http://secunia.com/advisories/21617 http://securitytracker.com/id?1016737 http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml http://www.osvdb.org/28138 http://www.osvdb.org/28139 http://www.securityfocus.com/bid/19680 http://www.vupen.com/english/advisories/2006/3368 https://exchange.xforce.ibmcloud.com/vulnerabilities/28539 •

CVSS: 5.0EPSS: 5%CPEs: 138EXPL: 0

Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected. Protocolo Internet Key Exchange (IKE) version 1, implementado para Cisco IOS, VPN 3000 Concentrators, y PIX firewalls, permite a atacantes remotos provocar denegación de servicio (agotamiento de recursos) a través de un flood de paquetes IKE Phase-1 que exceden el ratio de expiración de la sesión. NOTA: se ha indicado que esto es debido a un diseño debil del protocolo IKe version 1, en cuyo caso otros vendedores e implementaciones podrían verse afectados. • http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html http://securityreason.com/securityalert/1293 http://securitytracker.com/id?1016582 http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html http://www.osvdb.org/29068 http://www.securityfocus.com/archive/1/441203/100/0/threaded http://www.securityfocus.com/bid/19176 https://exchange.xforce.ibmcloud.com/vulnerabilities& •

CVSS: 2.6EPSS: 1%CPEs: 38EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in the WebVPN feature in the Cisco VPN 3000 Series Concentrators and Cisco ASA 5500 Series Adaptive Security Appliances (ASA), when in WebVPN clientless mode, allow remote attackers to inject arbitrary web script or HTML via the domain parameter in (1) dnserror.html and (2) connecterror.html, aka bugid CSCsd81095 (VPN3k) and CSCse48193 (ASA). NOTE: the vendor states that "WebVPN full-network-access mode" is not affected, despite the claims by the original researcher. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en WebVPN en la serie Cisco VPN 3000 y concentradores Cisco ASA 5500 Series Adaptive Security Appliances (ASA), cuando se encuentra en el modo de WebVPN sin cliente, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro domain en (1) dnserror.html y (2) connecterror.html, también conocido como bugid CSCsd81095 (VPN3k) y CSCse48193 (ASA). NOTA: El fabricante indica que "WebVPN full-network-access mode" no se ve afectada, a pesar de las alegaciones formuladas por el investigador original. • http://secunia.com/advisories/20644 http://securitytracker.com/id?1016252 http://www.cisco.com/warp/public/707/cisco-sr-20060613-webvpn-xss.shtml http://www.osvdb.org/26453 http://www.osvdb.org/26454 http://www.securityfocus.com/archive/1/436479/30/0/threaded http://www.securityfocus.com/bid/18419 http://www.vupen.com/english/advisories/2006/2331 https://exchange.xforce.ibmcloud.com/vulnerabilities/27086 •

CVSS: 7.8EPSS: 1%CPEs: 11EXPL: 0

Cisco VPN 3000 series concentrators running software 4.7.0 through 4.7.2.A allow remote attackers to cause a denial of service (device reload or user disconnect) via a crafted HTTP packet. • http://secunia.com/advisories/18629 http://securityreason.com/securityalert/375 http://securitytracker.com/id?1015546 http://www.cisco.com/warp/public/707/cisco-sa-20060126-vpn.shtml http://www.osvdb.org/22754 http://www.securityfocus.com/bid/16394 http://www.vupen.com/english/advisories/2006/0346 https://exchange.xforce.ibmcloud.com/vulnerabilities/24330 •