Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m6gf-4gcj-j6c4

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 before 9.0(2.6) and 9.1 before 9.1(2) allows remote attackers to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCuf52468.

The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 before 9.0(2.6) and 9.1 before 9.1(2) allows remote attackers to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCuf52468.

EPSS

Процентиль: 80%
0.01392
Низкий

Связанные уязвимости

nvd
больше 12 лет назад

The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 before 9.0(2.6) and 9.1 before 9.1(2) allows remote attackers to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCuf52468.

EPSS

Процентиль: 80%
0.01392
Низкий