The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47, 8.3 before 8.3(2.40), 8.4 before 8.4(7.3), 8.6 before 8.6(1.13), 9.0 before 9.0(3.8), and 9.1 before 9.1(3.2) allows remote attackers to bypass authentication via (1) a crafted cookie value within modified HTTP POST data or (2) a crafted URL, aka Bug ID CSCua85555.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa - Vendor Advisory |
15 Aug 2023, 15:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:* |
cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:* |
11 Aug 2023, 19:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:* |
cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(1\):*:*:*:*:*:*:* cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:* |
Information
Published : 2014-04-10 04:34
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2128
Mitre link : CVE-2014-2128
CVE.ORG link : CVE-2014-2128
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_software
CWE
CWE-287
Improper Authentication