Логотип exploitDog
bind:CVE-2015-0675
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-0675

Количество 3

Количество 3

nvd логотип

CVE-2015-0675

почти 11 лет назад

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

CVSS2: 8.3
EPSS: Низкий
github логотип

GHSA-5p4h-p3w9-2g68

больше 3 лет назад

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

EPSS: Низкий
fstec логотип

BDU:2015-09910

почти 11 лет назад

Уязвимость микропрограммного обеспечения устройства защиты Cisco ASA, позволяющая злоумышленнику получить права администратора

CVSS2: 8.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2015-0675

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

CVSS2: 8.3
0%
Низкий
почти 11 лет назад
github логотип
GHSA-5p4h-p3w9-2g68

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2015-09910

Уязвимость микропрограммного обеспечения устройства защиты Cisco ASA, позволяющая злоумышленнику получить права администратора

CVSS2: 8.3
0%
Низкий
почти 11 лет назад

Уязвимостей на страницу