var-201101-0326
Vulnerability from variot
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) do not properly preserve ACL behavior after a migration, which allows remote attackers to bypass intended access restrictions via an unspecified type of network traffic that had previously been denied, aka Bug ID CSCte46460. The Cisco Adaptive Security Appliance is an adaptive security appliance that provides modules for security and VPN services. The vulnerabilities include multiple denial-of-service vulnerabilities, a security-bypass vulnerability, and an information-disclosure vulnerability. Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible. Cisco ASA 5500 series security appliances with software prior to 8.3(2) are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0326", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2\\(2.48\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2\\(2.5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2\\(2.8\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2\\(2.18\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2\\(2.19\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(0\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(2.7\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(2.16\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(2.10\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2.49\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(6.7\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(1\\)" }, { "model": "5500 series adaptive security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.4.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2.27\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.1.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.2" }, { "model": "adaptive security appliance software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2.2" }, { "model": "asa 5500", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(2.15\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2.5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(5.2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(3.9\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2.48\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(2.17\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(1.22\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.2\\(2.14\\)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.0(8.10)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.0(8.11)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.1" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.2" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.2(4.44)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.2(4.45)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.2(4.46)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.2(5)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(4.38)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(4.44)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(5.1)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(5.15)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(5.17)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(5.19)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(5.2)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(5.6)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.0(5.7)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1(2.35)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1(2.37)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1(2.39)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1(2.40)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1(2.44)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1(2.45)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.1(2.46)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(1.10)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(1.15)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(1.16)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(1.2)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(1.5)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(2)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(2.1)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(2.10)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(2.13)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(2.17)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(3)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2(4)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.3" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.3(0.08)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.3(1.1)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.3(1.6)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.0" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.0.4" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55007.0.4.3" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "55008.2.2" }, { "model": "adaptive security appliance", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5500 version 8.3(2)" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55008.2" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55008.1(2.29)" }, { "model": "asa series adaptive security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "55008.3(2)" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0102" }, { "db": "BID", "id": "45768" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "db": "CNNVD", "id": "CNNVD-201101-072" }, { "db": "NVD", "id": "CVE-2010-4689" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:adaptive_security_appliance", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001107" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "45768" } ], "trust": 0.3 }, "cve": "CVE-2010-4689", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2010-4689", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-47294", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-4689", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2010-4689", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201101-072", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-47294", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-47294" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "db": "CNNVD", "id": "CNNVD-201101-072" }, { "db": "NVD", "id": "CVE-2010-4689" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) do not properly preserve ACL behavior after a migration, which allows remote attackers to bypass intended access restrictions via an unspecified type of network traffic that had previously been denied, aka Bug ID CSCte46460. The Cisco Adaptive Security Appliance is an adaptive security appliance that provides modules for security and VPN services. The vulnerabilities include multiple denial-of-service vulnerabilities, a security-bypass vulnerability, and an information-disclosure vulnerability. \nExploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible. \nCisco ASA 5500 series security appliances with software prior to 8.3(2) are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2010-4689" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "db": "CNVD", "id": "CNVD-2011-0102" }, { "db": "BID", "id": "45768" }, { "db": "VULHUB", "id": "VHN-47294" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-4689", "trust": 3.4 }, { "db": "BID", "id": "45768", "trust": 2.2 }, { "db": "SECTRACK", "id": "1024963", "trust": 1.9 }, { "db": "XF", "id": "64575", "trust": 0.8 }, { "db": "VUPEN", "id": "ADV-2011-0130", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-001107", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201101-072", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2011-0102", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-47294", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0102" }, { "db": "VULHUB", "id": "VHN-47294" }, { "db": "BID", "id": "45768" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "db": "CNNVD", "id": "CNNVD-201101-072" }, { "db": "NVD", "id": "CVE-2010-4689" } ] }, "id": "VAR-201101-0326", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-0102" }, { "db": "VULHUB", "id": "VHN-47294" } ], "trust": 1.3368590999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0102" } ] }, "last_update_date": "2024-11-23T21:47:04.031000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "22291", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=22291" }, { "title": "Release Notes for the Cisco ASA 5500 Series, Version 8.3(x)", "trust": 0.8, "url": "http://www.cisco.com/en/US/docs/security/asa/asa83/release/notes/asarn83.pdf" }, { "title": "Cisco Adaptive Security Appliance incorrectly retains patches for ACL behavior rule vulnerabilities after migration", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2528" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0102" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-47294" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "db": "NVD", "id": "CVE-2010-4689" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.securityfocus.com/bid/45768" }, { "trust": 1.7, "url": "http://www.cisco.com/en/us/docs/security/asa/asa83/release/notes/asarn83.pdf" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1024963" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64575" }, { "trust": 0.9, "url": "http://www.cisco.com/en/us/docs/security/asa/asa83/release/notes/asarn83.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4689" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/64575" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4689" }, { "trust": 0.8, "url": "http://securitytracker.com/id?1024963" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2011/0130" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0102" }, { "db": "VULHUB", "id": "VHN-47294" }, { "db": "BID", "id": "45768" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "db": "CNNVD", "id": "CNNVD-201101-072" }, { "db": "NVD", "id": "CVE-2010-4689" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-0102" }, { "db": "VULHUB", "id": "VHN-47294" }, { "db": "BID", "id": "45768" }, { "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "db": "CNNVD", "id": "CNNVD-201101-072" }, { "db": "NVD", "id": "CVE-2010-4689" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-12T00:00:00", "db": "CNVD", "id": "CNVD-2011-0102" }, { "date": "2011-01-07T00:00:00", "db": "VULHUB", "id": "VHN-47294" }, { "date": "2011-01-11T00:00:00", "db": "BID", "id": "45768" }, { "date": "2011-02-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "date": "2011-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-072" }, { "date": "2011-01-07T23:00:19.500000", "db": "NVD", "id": "CVE-2010-4689" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-12T00:00:00", "db": "CNVD", "id": "CNVD-2011-0102" }, { "date": "2017-08-17T00:00:00", "db": "VULHUB", "id": "VHN-47294" }, { "date": "2011-01-11T00:00:00", "db": "BID", "id": "45768" }, { "date": "2011-02-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001107" }, { "date": "2011-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-072" }, { "date": "2024-11-21T01:21:31.613000", "db": "NVD", "id": "CVE-2010-4689" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-072" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Adaptive Security Appliances Vulnerabilities that prevent access restrictions on devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001107" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-072" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.