ID

VAR-200702-0340


CVE

CVE-2007-0960


TITLE

Cisco PIX/ASA User authentication in LOCAL Elevation of privilege vulnerability when using methods

Trust: 0.8

sources: JVNDB: JVNDB-2007-000143

DESCRIPTION

Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors. Cisco PIX 500 Series and Cisco ASA 5500 series The security appliance has user authentication. LOCAL A vulnerability exists that could allow elevation of privilege by remotely authenticated users when using the method. According to information from Cisco Systems, users who exploit this vulnerability are privileged. 0 Defined in the local database, only in this case the user is privileged 15 Has been reported to be able to be elevated to administrator privileges.On devices under certain conditions, it may be possible to gain administrative privileges from a remotely authenticated user. Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Both the Cisco PIX and the ASA are very popular firewall devices that provide firewall services capable of stateful packet filtering and deep packet inspection. Remote attackers may use this loophole to elevate their privileges on the device. Only users who meet these conditions can escalate their assigned privileges to level 15. Once an administrator, users can change every aspect of device configuration and operation. A device is affected by this vulnerability if the following line exists in the device configuration: pixfirewall(config)# aaa authentication enable console LOCAL pixfirewall(config)# username <user_name> password <secret_pwd> privilege 0 This vulnerability is documented in Cisco Bug ID as CSCsh33287. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco PIX and ASA Privilege Escalation and Denial of Service SECUNIA ADVISORY ID: SA24160 VERIFY ADVISORY: http://secunia.com/advisories/24160/ CRITICAL: Moderately critical IMPACT: Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Cisco PIX 7.x http://secunia.com/product/6102/ Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/ DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). 1) An unspecified error exists within the enhanced HTTP inspection feature. This can be exploited to crash the device via malformed HTTP requests, but requires that enhanced HTTP inspection is enabled. 2) An unspecified error exists within the SIP packet inspection. This can be exploited to crash the device by sending specially crafted SIP packets, but requires that "inspect" is enabled (it is disabled by default). 3) An unspecified error exists within the TCP-based protocol inspection. This can be exploited to crash the device via malformed packets, but requires that inspection of TCP-based protocols (e.g. FTP or HTTP) is enabled. Successful exploitation allows gaining privilege level 15 and changing the complete configuration of the device, but requires that the attacker can authenticate to the device and that he is defined in the local database with privilege level 0. SOLUTION: Apply updated versions. See the vendor advisory for a patch matrix. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . 2) An unspecified vulnerability when manipulating ACLs (Access Control Lists) that makes use of object groups can be exploited to corrupt ACLs, resulting in ACE (Access Control Entries) being skipped or not evaluated in order. Successful exploitation requires that "SIP fixup" is enabled, which is the default setting

Trust: 2.16

sources: NVD: CVE-2007-0960 // JVNDB: JVNDB-2007-000143 // BID: 22562 // VULHUB: VHN-24322 // PACKETSTORM: 54452 // PACKETSTORM: 54453

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewall softwarescope:eqversion:7.2\(2\)

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:7.2\(2\)

Trust: 1.6

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:7.2\(2\)

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(2.10)

Trust: 0.3

sources: BID: 22562 // JVNDB: JVNDB-2007-000143 // CNNVD: CNNVD-200702-322 // NVD: CVE-2007-0960

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0960
value: HIGH

Trust: 1.0

NVD: CVE-2007-0960
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200702-322
value: CRITICAL

Trust: 0.6

VULHUB: VHN-24322
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0960
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24322
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24322 // JVNDB: JVNDB-2007-000143 // CNNVD: CNNVD-200702-322 // NVD: CVE-2007-0960

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0960

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200702-322

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200702-322

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000143

PATCH

title:cisco-sa-20070214-pixurl:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-000143

EXTERNAL IDS

db:BIDid:22562

Trust: 2.8

db:NVDid:CVE-2007-0960

Trust: 2.8

db:SECUNIAid:24160

Trust: 2.6

db:SECUNIAid:24179

Trust: 1.8

db:SECTRACKid:1017652

Trust: 1.7

db:SECTRACKid:1017651

Trust: 1.7

db:OSVDBid:33063

Trust: 1.7

db:BIDid:22561

Trust: 1.7

db:VUPENid:ADV-2007-0608

Trust: 1.7

db:JVNDBid:JVNDB-2007-000143

Trust: 0.8

db:CNNVDid:CNNVD-200702-322

Trust: 0.7

db:XFid:32489

Trust: 0.6

db:CISCOid:20070214 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCES

Trust: 0.6

db:VULHUBid:VHN-24322

Trust: 0.1

db:PACKETSTORMid:54452

Trust: 0.1

db:PACKETSTORMid:54453

Trust: 0.1

sources: VULHUB: VHN-24322 // BID: 22562 // JVNDB: JVNDB-2007-000143 // PACKETSTORM: 54452 // PACKETSTORM: 54453 // CNNVD: CNNVD-200702-322 // NVD: CVE-2007-0960

REFERENCES

url:http://www.securityfocus.com/bid/22562

Trust: 2.5

url:http://www.securityfocus.com/bid/22561

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2484.shtml

Trust: 1.7

url:http://osvdb.org/33063

Trust: 1.7

url:http://www.securitytracker.com/id?1017651

Trust: 1.7

url:http://www.securitytracker.com/id?1017652

Trust: 1.7

url:http://secunia.com/advisories/24160

Trust: 1.7

url:http://secunia.com/advisories/24179

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/0608

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/0608

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32489

Trust: 1.1

url:http://secunia.com/advisories/24160/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0960

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0960

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/32489

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.5

url:http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/

Trust: 0.3

url:/archive/1/460079

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/software_inspector/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

url:http://secunia.com/product/56/

Trust: 0.1

url:http://secunia.com/advisories/24179/

Trust: 0.1

sources: VULHUB: VHN-24322 // BID: 22562 // JVNDB: JVNDB-2007-000143 // PACKETSTORM: 54452 // PACKETSTORM: 54453 // CNNVD: CNNVD-200702-322 // NVD: CVE-2007-0960

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200702-322

SOURCES

db:VULHUBid:VHN-24322
db:BIDid:22562
db:JVNDBid:JVNDB-2007-000143
db:PACKETSTORMid:54452
db:PACKETSTORMid:54453
db:CNNVDid:CNNVD-200702-322
db:NVDid:CVE-2007-0960

LAST UPDATE DATE

2024-11-23T21:49:12.953000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24322date:2018-10-30T00:00:00
db:BIDid:22562date:2016-07-06T14:39:00
db:JVNDBid:JVNDB-2007-000143date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200702-322date:2007-02-19T00:00:00
db:NVDid:CVE-2007-0960date:2024-11-21T00:27:09.910

SOURCES RELEASE DATE

db:VULHUBid:VHN-24322date:2007-02-16T00:00:00
db:BIDid:22562date:2007-02-14T00:00:00
db:JVNDBid:JVNDB-2007-000143date:2007-04-01T00:00:00
db:PACKETSTORMid:54452date:2007-02-16T06:49:41
db:PACKETSTORMid:54453date:2007-02-16T06:49:41
db:CNNVDid:CNNVD-200702-322date:2007-02-15T00:00:00
db:NVDid:CVE-2007-0960date:2007-02-16T00:28:00