Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-0229

Опубликовано: 19 апр. 2018
Источник: nvd
CVSS3: 6.5
CVSS2: 4.3
EPSS Низкий

Описание

A vulnerability in the implementation of Security Assertion Markup Language (SAML) Single Sign-On (SSO) authentication for Cisco AnyConnect Secure Mobility Client for Desktop Platforms, Cisco Adaptive Security Appliance (ASA) Software, and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish an authenticated AnyConnect session through an affected device running ASA or FTD Software. The authentication would need to be done by an unsuspecting third party, aka Session Fixation. The vulnerability exists because there is no mechanism for the ASA or FTD Software to detect that the authentication request originates from the AnyConnect client directly. An attacker could exploit this vulnerability by persuading a user to click a crafted link and authenticating using the company's Identity Provider (IdP). A successful exploit could allow the attacker to hijack a valid authentication token and use that to establish an authenticated AnyConnect

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.6\(200\):*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8\(1.245\):*:*:*:*:*:*:*

EPSS

Процентиль: 80%
0.01391
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-384
CWE-384

Связанные уязвимости

CVSS3: 6.5
github
больше 3 лет назад

A vulnerability in the implementation of Security Assertion Markup Language (SAML) Single Sign-On (SSO) authentication for Cisco AnyConnect Secure Mobility Client for Desktop Platforms, Cisco Adaptive Security Appliance (ASA) Software, and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish an authenticated AnyConnect session through an affected device running ASA or FTD Software. The authentication would need to be done by an unsuspecting third party, aka Session Fixation. The vulnerability exists because there is no mechanism for the ASA or FTD Software to detect that the authentication request originates from the AnyConnect client directly. An attacker could exploit this vulnerability by persuading a user to click a crafted link and authenticating using the company's Identity Provider (IdP). A successful exploit could allow the attacker to hijack a valid authentication token and use that to establish an authenticated AnyConne...

CVSS3: 6.5
fstec
почти 8 лет назад

Уязвимость реализации Security Assertion Markup Language механизма аутентификации Single sign-on клиента программного обеспечения защищенного мобильного доступа Cisco AnyConnect Secure Mobility Client, межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD), позволяющая нарушителю обойти процедуру аутентификации

EPSS

Процентиль: 80%
0.01391
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-384
CWE-384