Cisco PIX firewall manager (PFM) 4.3(2)g logs the enable password in plaintext in the pfm.log file, which could allow local users to obtain the password by reading the file.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-10/0071.html | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/639507 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/3419 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7265 | |
http://archives.neohapsis.com/archives/bugtraq/2001-10/0071.html | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/639507 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/3419 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7265 |
Configurations
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-10/0071.html - Exploit, Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/639507 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/3419 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7265 - |
Information
Published : 2001-10-10 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-1098
Mitre link : CVE-2001-1098
CVE.ORG link : CVE-2001-1098
JSON object : View
Products Affected
cisco
- pix_firewall_manager
CWE