var-200701-0177
Vulnerability from variot
The Cisco Security Monitoring, Analysis and Response System (CS-MARS) before 4.2.3 and Adaptive Security Device Manager (ASDM) before 5.2(2.54) do not validate the SSL/TLS certificates or SSH public keys when connecting to devices, which allows remote attackers to spoof those devices to obtain sensitive information or generate incorrect information. This issue is tracked by Cisco Bug IDs CSCsf95930 and CSCsg78595. Cisco CS-MARS can receive event logs from various network devices, correlate and analyze the received security problem data, and report findings; ASDM can provide management and monitoring services for various Cisco security devices, and provide firewall services for Cisco switches and routers module. Cisco CS-MARS and ASDM have vulnerabilities in the implementation of communication authentication with managed devices. Because the certificate and public key provided by the device are not verified, if the certificate or public key changes, the affected product cannot determine whether the device it communicates with is legitimate, or whether the device is pretending to be a legitimate device.
Secunia is proud to announce the availability of the Secunia Software Inspector.
The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. This can be exploited to conduct spoofing attacks and possibly gain knowledge of sensitive information.
SOLUTION: Update to the latest version. http://www.cisco.com/pcgi-bin/tablebuild.pl/asa-interim?psrtdcat20e2
PROVIDED AND/OR DISCOVERED BY: The vendor credits Jan Bervar, NIL Data Communications.
ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070118-certs.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0177", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "security monitoring analysis and response system", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.2.3" }, { "model": "adaptive security appliance device manager", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.2.53" }, { "model": "adaptive security device manager", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.2(2.54)" }, { "model": "security monitoring, analysis and response system", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "4.2.3" }, { "model": "adaptive security device manager", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.2.53" }, { "model": "networks contivity vpn switch", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "20004.1.3" }, { "model": "networks contivity vpn switch", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "20004.1.2" }, { "model": "networks contivity vpn switch", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "20004.1" }, { "model": "cs-mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.2" }, { "model": "cs-mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.1" }, { "model": "cs-mars", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.5" }, { "model": "asdm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "cs-mars", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2.3" }, { "model": "asdm", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2" } ], "sources": [ { "db": "BID", "id": "22111" }, { "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "db": "CNNVD", "id": "CNNVD-200701-320" }, { "db": "NVD", "id": "CVE-2007-0397" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:adaptive_security_device_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:security_monitoring_analysis_and_response_system", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001419" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jan Bervar", "sources": [ { "db": "CNNVD", "id": "CNNVD-200701-320" } ], "trust": 0.6 }, "cve": "CVE-2007-0397", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2007-0397", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-23759", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-0397", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-0397", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200701-320", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-23759", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-23759" }, { "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "db": "CNNVD", "id": "CNNVD-200701-320" }, { "db": "NVD", "id": "CVE-2007-0397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Cisco Security Monitoring, Analysis and Response System (CS-MARS) before 4.2.3 and Adaptive Security Device Manager (ASDM) before 5.2(2.54) do not validate the SSL/TLS certificates or SSH public keys when connecting to devices, which allows remote attackers to spoof those devices to obtain sensitive information or generate incorrect information. \nThis issue is tracked by Cisco Bug IDs CSCsf95930 and CSCsg78595. Cisco CS-MARS can receive event logs from various network devices, correlate and analyze the received security problem data, and report findings; ASDM can provide management and monitoring services for various Cisco security devices, and provide firewall services for Cisco switches and routers module. Cisco CS-MARS and ASDM have vulnerabilities in the implementation of communication authentication with managed devices. Because the certificate and public key provided by the device are not verified, if the certificate or public key changes, the affected product cannot determine whether the device it communicates with is legitimate, or whether the device is pretending to be a legitimate device. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. This can be exploited\nto conduct spoofing attacks and possibly gain knowledge of sensitive\ninformation. \n\nSOLUTION:\nUpdate to the latest version. \nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/asa-interim?psrtdcat20e2\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Jan Bervar, NIL Data Communications. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070118-certs.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-0397" }, { "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "db": "BID", "id": "22111" }, { "db": "VULHUB", "id": "VHN-23759" }, { "db": "PACKETSTORM", "id": "53759" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-0397", "trust": 2.5 }, { "db": "BID", "id": "22111", "trust": 2.0 }, { "db": "SECUNIA", "id": "23836", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-0245", "trust": 1.7 }, { "db": "SECTRACK", "id": "1017536", "trust": 1.7 }, { "db": "SECTRACK", "id": "1017535", "trust": 1.7 }, { "db": "OSVDB", "id": "32720", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-001419", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200701-320", "trust": 0.7 }, { "db": "XF", "id": "31567", "trust": 0.6 }, { "db": "CISCO", "id": "20070118 SSL/TLS CERTIFICATE AND SSH PUBLIC KEY VALIDATION VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-23759", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "53759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-23759" }, { "db": "BID", "id": "22111" }, { "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "db": "PACKETSTORM", "id": "53759" }, { "db": "CNNVD", "id": "CNNVD-200701-320" }, { "db": "NVD", "id": "CVE-2007-0397" } ] }, "id": "VAR-200701-0177", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-23759" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:54:10.727000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20070118-certs", "trust": 0.8, "url": "http://www.cisco.com/en/US/products/csa/cisco-sa-20070118-certs.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001419" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-0397" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/22111" }, { "trust": 1.7, "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00807c517f.shtml" }, { "trust": 1.7, "url": "http://osvdb.org/32720" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1017535" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1017536" }, { "trust": 1.7, "url": "http://secunia.com/advisories/23836" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/0245" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31567" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0397" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0397" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/31567" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/0245" }, { "trust": 0.4, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070118-certs.shtml" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps6121/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps6241/index.html" }, { "trust": 0.3, "url": "/archive/1/457291" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/asa-interim?psrtdcat20e2" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6780/" }, { "trust": 0.1, "url": "http://secunia.com/software_inspector/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/23836/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/12574/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/cs-mars?psrtdcat20e2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-23759" }, { "db": "BID", "id": "22111" }, { "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "db": "PACKETSTORM", "id": "53759" }, { "db": "CNNVD", "id": "CNNVD-200701-320" }, { "db": "NVD", "id": "CVE-2007-0397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-23759" }, { "db": "BID", "id": "22111" }, { "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "db": "PACKETSTORM", "id": "53759" }, { "db": "CNNVD", "id": "CNNVD-200701-320" }, { "db": "NVD", "id": "CVE-2007-0397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-01-20T00:00:00", "db": "VULHUB", "id": "VHN-23759" }, { "date": "2007-01-18T00:00:00", "db": "BID", "id": "22111" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "date": "2007-01-20T00:09:28", "db": "PACKETSTORM", "id": "53759" }, { "date": "2007-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-320" }, { "date": "2007-01-20T01:28:00", "db": "NVD", "id": "CVE-2007-0397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-23759" }, { "date": "2007-01-18T20:10:00", "db": "BID", "id": "22111" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001419" }, { "date": "2007-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-320" }, { "date": "2024-11-21T00:25:45.683000", "db": "NVD", "id": "CVE-2007-0397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200701-320" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CS-MARS Vulnerabilities that generate inaccurate information", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001419" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "22111" }, { "db": "CNNVD", "id": "CNNVD-200701-320" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.