CVE-2012-1348

Cisco Wide Area Application Services (WAAS) appliances with software 4.4, 5.0, and 5.1 include a one-way hash of a password within output text, which might allow remote attackers to obtain sensitive information via a brute-force attack on the hash string, aka Bug ID CSCty17279.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:4.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v501/release/notes/ws501xrn.pdf - Vendor Advisory () http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v501/release/notes/ws501xrn.pdf - Vendor Advisory

Information

Published : 2012-08-06 18:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1348

Mitre link : CVE-2012-1348

CVE.ORG link : CVE-2012-1348


JSON object : View

Products Affected

cisco

  • wide_area_application_services
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor