The syslog-management subsystem in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to obtain an administrator password by waiting for an administrator to copy a file, and then (1) sniffing the network for a syslog message or (2) reading a syslog message in a file on a syslog server, aka Bug IDs CSCuq22357 and CSCur41860.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410 | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410 | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410 - Vendor Advisory |
11 Aug 2023, 18:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:* |
Information
Published : 2014-12-20 00:59
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3410
Mitre link : CVE-2014-3410
CVE.ORG link : CVE-2014-3410
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_software
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor