Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5p4h-p3w9-2g68

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

EPSS

Процентиль: 44%
0.00214
Низкий

Дефекты

CWE-284

Связанные уязвимости

nvd
почти 11 лет назад

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

fstec
почти 11 лет назад

Уязвимость микропрограммного обеспечения устройства защиты Cisco ASA, позволяющая злоумышленнику получить права администратора

EPSS

Процентиль: 44%
0.00214
Низкий

Дефекты

CWE-284