fkie_cve-2012-0335
Vulnerability from fkie_nvd
Published
2012-05-02 10:09
Modified
2024-11-21 01:34
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C15D1F6-997D-47FD-A654-AEF3332E6105", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5990B883-0B5A-44F0-B4DC-8031ED0F2026", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*", "matchCriteriaId": "E5A002AD-3EB0-43CB-AFAF-4A44DAF11007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7F417BC-5835-4F29-8DB6-03A62B7B2364", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A914DE5-2269-451A-823A-B26AE1A7F980", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "4956430E-BEC1-4788-B0D2-E50E36C70306", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746." }, { "lang": "es", "value": "Los dispositivos Cisco Adaptive Security Appliances (ASA) de la serie 5500 con el software v7.2 hasta v8.4 no realiza correctamente la autenticaci\u00f3n del proxy a trav\u00e9s de un firewall, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de un intento de conexi\u00f3n, tambi\u00e9n conocido como Bug ID CSCtx42746." } ], "id": "CVE-2012-0335", "lastModified": "2024-11-21T01:34:49.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-02T10:09:21.893", "references": [ { "source": "psirt@cisco.com", "url": "http://secunia.com/advisories/49139" }, { "source": "psirt@cisco.com", "url": "http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/53558" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id?1027008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027008" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.