ID

VAR-200608-0339


CVE

CVE-2006-4312


TITLE

Cisco PIX Firewall Vulnerabilities that prevent authentication in the configuration process

Trust: 0.8

sources: JVNDB: JVNDB-2006-000518

DESCRIPTION

Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access. Cisco PIX Firewall In the case where the configuration process is incomplete, the software crashes or the password stored in the startup configuration is unintentionally specified by the user when multiple users change the configuration in parallel. There is a vulnerability that changes to the value of.There is a possibility of unauthorized access to the target device using the changed password. Multiple Cisco Firewall appliances are prone to an authentication-bypass vulnerability. The vulnerability occurs because the firmware fails to properly handle certain configuration errors, resulting in unintended password changes to non-random specific passwords. This issue allows remote attackers to gain unauthorized access to the affected network appliances with administrative or local user privileges. These issues are tracked by Cisco Bug IDs CSCse02703 and CSCsd81487. Cisco PIX, ASA, and FWSM are very popular firewall devices that provide firewall services capable of stateful packet filtering and deep packet inspection. There are only two situations that can trigger this software bug: * Software crashes, usually caused by software bugs. Note that not all software crashes lead to the undesirable results described above. * Two or more users make configuration changes simultaneously on the same device. The vulnerability is triggered regardless of the method used to access the device (Command Line Interface [CLI], Adaptive Security Device Manager [ASDM], Firewall Management Center, etc.). Note that when saving the configuration to a stable medium that stores the startup configuration via the write memory or copy running-config startup-config commands, the password in the startup configuration is changed. In normal operation, the password in the startup configuration is not changed without saving the running configuration. If an AAA server (RADIUS or TACACS+) is used for authentication, regardless of whether LOCAL authentication is configured as fallback, only changing the password in the startup configuration when the AAA server is unavailable will cause the above undesirable results. This prevents administrators from being able to log in to the device if authentication is configured to use a password stored in the launch configuration. If a malicious user is able to guess the new password and restarts the device, whether it is an automatic restart caused by a software crash or a manual restart by a network administrator, unauthorized access to the device is possible. ---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Cisco Firewall Products Unintentional Password Modification SECUNIA ADVISORY ID: SA21616 VERIFY ADVISORY: http://secunia.com/advisories/21616/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Cisco PIX 7.x http://secunia.com/product/6102/ Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/ SOFTWARE: Cisco Firewall Services Module (FWSM) 3.x http://secunia.com/product/8614/ Cisco Firewall Services Module (FWSM) 2.x http://secunia.com/product/5088/ Cisco Firewall Services Module (FWSM) 1.x http://secunia.com/product/2273/ DESCRIPTION: A security issue has been reported in various Cisco Firewall products, which may allow malicious people to bypass certain security restrictions. The error may happen during a software crash or multiple users configuring a device at the same time. This may result in users being locked out or lead to unauthorised access to an affected device. SOLUTION: Update to a fixed version (see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: The vendor credits Terje Bless, Helse Nord IKT. ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-4312 // JVNDB: JVNDB-2006-000518 // BID: 19681 // VULHUB: VHN-20420 // PACKETSTORM: 49193

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3

Trust: 1.6

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 1.1

vendor:ciscomodel:pix firewall 515escope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 515scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 525scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 535scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 501scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 520scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 506scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix/asascope:eqversion:7.1

Trust: 0.8

vendor:ciscomodel:pix firewall 506scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 535scope: - version: -

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 501scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 0.6

vendor:ciscomodel:pix firewall 515scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 520scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 515escope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 525scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5)

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.1

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.0

Trust: 0.3

vendor:ciscomodel:fwsm for cisco catalyst seriesscope:eqversion:6500/76003.1

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(1.7)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0

Trust: 0.3

vendor:ciscomodel:pix firewall manager gscope:neversion:4.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5350

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5256.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:525

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:520

Trust: 0.3

vendor:ciscomodel:pix firewall 515escope:neversion: -

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:515

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5060

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5010

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3.5(112)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3.3(133)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3(3.109)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3(3.102)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2.3(110)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2.2.111

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2(3.100)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1.5(104)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1.5

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0(4.101)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.3(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.3(1.200)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(9)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(3.210)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.1(4.206)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.4(8)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.4(7.202)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.4(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.2

Trust: 0.3

vendor:ciscomodel:pix firewall bscope:neversion:4.1.6

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.1.6

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:4.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:3.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:2.7

Trust: 0.3

vendor:ciscomodel:gigabit switch router delscope:neversion:6.1

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:neversion:2.3(4)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:neversion:2.3

Trust: 0.3

sources: BID: 19681 // JVNDB: JVNDB-2006-000518 // CNNVD: CNNVD-200608-399 // NVD: CVE-2006-4312

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4312
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-4312
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200608-399
value: MEDIUM

Trust: 0.6

VULHUB: VHN-20420
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-4312
severity: MEDIUM
baseScore: 6.8
vectorString: AV:L/AC:L/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-20420
severity: MEDIUM
baseScore: 6.8
vectorString: AV:L/AC:L/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-20420 // JVNDB: JVNDB-2006-000518 // CNNVD: CNNVD-200608-399 // NVD: CVE-2006-4312

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-4312

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200608-399

TYPE

Design Error

Trust: 0.9

sources: BID: 19681 // CNNVD: CNNVD-200608-399

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000518

PATCH

title:cisco-sa-20060823-firewallurl:http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml

Trust: 0.8

title:cisco-sa-20060823-firewallurl:http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20060823-firewall-j.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2006-000518

EXTERNAL IDS

db:BIDid:19681

Trust: 2.8

db:NVDid:CVE-2006-4312

Trust: 2.5

db:SECUNIAid:21616

Trust: 1.8

db:SECTRACKid:1016740

Trust: 1.7

db:SECTRACKid:1016738

Trust: 1.7

db:SECTRACKid:1016739

Trust: 1.7

db:OSVDBid:28143

Trust: 1.7

db:VUPENid:ADV-2006-3367

Trust: 1.7

db:JVNDBid:JVNDB-2006-000518

Trust: 0.8

db:CNNVDid:CNNVD-200608-399

Trust: 0.7

db:CISCOid:20060823 UNINTENTIONAL PASSWORD MODIFICATION VULNERABILITY IN CISCO FIREWALL PRODUCTS

Trust: 0.6

db:XFid:28540

Trust: 0.6

db:VULHUBid:VHN-20420

Trust: 0.1

db:PACKETSTORMid:49193

Trust: 0.1

sources: VULHUB: VHN-20420 // BID: 19681 // JVNDB: JVNDB-2006-000518 // PACKETSTORM: 49193 // CNNVD: CNNVD-200608-399 // NVD: CVE-2006-4312

REFERENCES

url:http://www.securityfocus.com/bid/19681

Trust: 2.5

url:http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml

Trust: 1.7

url:http://www.osvdb.org/28143

Trust: 1.7

url:http://securitytracker.com/id?1016738

Trust: 1.7

url:http://securitytracker.com/id?1016739

Trust: 1.7

url:http://securitytracker.com/id?1016740

Trust: 1.7

url:http://secunia.com/advisories/21616

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2006/3367

Trust: 1.4

url:http://www.vupen.com/english/advisories/2006/3367

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28540

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4312

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4312

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/28540

Trust: 0.6

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807183b0.shtml

Trust: 0.3

url:/archive/1/444126

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/advisories/21616/

Trust: 0.1

url:http://secunia.com/product/8614/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/product/5088/

Trust: 0.1

url:http://secunia.com/product/2273/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-20420 // BID: 19681 // JVNDB: JVNDB-2006-000518 // PACKETSTORM: 49193 // CNNVD: CNNVD-200608-399 // NVD: CVE-2006-4312

CREDITS

Terje Bless

Trust: 0.6

sources: CNNVD: CNNVD-200608-399

SOURCES

db:VULHUBid:VHN-20420
db:BIDid:19681
db:JVNDBid:JVNDB-2006-000518
db:PACKETSTORMid:49193
db:CNNVDid:CNNVD-200608-399
db:NVDid:CVE-2006-4312

LAST UPDATE DATE

2024-08-14T14:47:54.206000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-20420date:2018-10-30T00:00:00
db:BIDid:19681date:2006-09-01T21:38:00
db:JVNDBid:JVNDB-2006-000518date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200608-399date:2006-08-26T00:00:00
db:NVDid:CVE-2006-4312date:2018-10-30T16:25:19.683

SOURCES RELEASE DATE

db:VULHUBid:VHN-20420date:2006-08-23T00:00:00
db:BIDid:19681date:2006-08-23T00:00:00
db:JVNDBid:JVNDB-2006-000518date:2007-04-01T00:00:00
db:PACKETSTORMid:49193date:2006-08-27T00:18:48
db:CNNVDid:CNNVD-200608-399date:2006-08-23T00:00:00
db:NVDid:CVE-2006-4312date:2006-08-23T22:04:00