ID

VAR-200709-0395


CVE

CVE-2007-4786


TITLE

Cisco Adaptive Security Appliance AAA Authentication Feature Information Disclosure Vulnerability

Trust: 0.9

sources: BID: 25548 // CNNVD: CNNVD-200709-097

DESCRIPTION

Cisco Adaptive Security Appliance (ASA) running PIX 7.0 before 7.0.7.1, 7.1 before 7.1.2.61, 7.2 before 7.2.2.34, and 8.0 before 8.0.2.11, when AAA is enabled, composes %ASA-5-111008 messages from the "test aaa" command with cleartext passwords and sends them over the network to a remote syslog server or places them in a local logging buffer, which allows context-dependent attackers to obtain sensitive information. The issue arises in the Authentication, Authorization and Accounting (AAA) feature when troubleshooting the ASA server. An attacker can exploit this issue to access users' authentication credentials. Information obtained may lead to further attacks. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. The weakness is caused due to Cisco ASA not correctly sanitising log messages of the "test aaa-server" command before sending them to syslog. This can lead to the disclosure of sensitive information like usernames and passwords. The error occurs when a user with privilege level 15 or above executes the "test aaa-server" command and logging level 5 (notifications) is activated. SOLUTION: Update to 8.0.2.11 for the 8.0 train, 7.2.2.34 for the 7.2 train, 7.1.2.61 for the 7.1 train, and 7.0.7.1 for the 7.0 train. PROVIDED AND/OR DISCOVERED BY: Lisa Sittler, CERT/CC. ORIGINAL ADVISORY: US-CERT VU#563673: http://www.kb.cert.org/vuls/id/563673 http://www.kb.cert.org/vuls/id/MIMG-74ZK93 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2007-4786 // CERT/CC: VU#563673 // JVNDB: JVNDB-2007-002609 // BID: 25548 // VULHUB: VHN-28148 // PACKETSTORM: 59114

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:7.1.2.61

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:7.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:7.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:8.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:8.0.2.11

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:7.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:7.0.7.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:7.2.2.34

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0

Trust: 0.9

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2

Trust: 0.9

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.1

Trust: 0.9

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco adaptive security appliancescope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco adaptive security appliancescope:ltversion:7.0.7.1

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.6.22

Trust: 0.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.6.29

Trust: 0.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.6.18

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0\(4\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.6.26

Trust: 0.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.6.32

Trust: 0.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.7

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0

Trust: 0.3

sources: CERT/CC: VU#563673 // BID: 25548 // JVNDB: JVNDB-2007-002609 // CNNVD: CNNVD-200709-097 // NVD: CVE-2007-4786

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4786
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2007-4786
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#563673
value: 0.13

Trust: 0.8

NVD: CVE-2007-4786
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200709-097
value: MEDIUM

Trust: 0.6

VULHUB: VHN-28148
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-4786
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:H/AU:S/C:C/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28148
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:H/AU:S/C:C/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2007-4786
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2007-4786
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CERT/CC: VU#563673 // VULHUB: VHN-28148 // JVNDB: JVNDB-2007-002609 // CNNVD: CNNVD-200709-097 // NVD: CVE-2007-4786 // NVD: CVE-2007-4786

PROBLEMTYPE DATA

problemtype:CWE-319

Trust: 1.0

problemtype:Sending important information in clear text (CWE-319) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-255

Trust: 0.1

sources: VULHUB: VHN-28148 // JVNDB: JVNDB-2007-002609 // NVD: CVE-2007-4786

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-200709-097

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-200709-097

PATCH

title:Top Pageurl:http://www.cisco.com/en/US/products/ps6120/index.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-002609

EXTERNAL IDS

db:CERT/CCid:VU#563673

Trust: 3.7

db:NVDid:CVE-2007-4786

Trust: 3.6

db:SECUNIAid:26677

Trust: 2.7

db:BIDid:25548

Trust: 2.0

db:OSVDBid:37499

Trust: 1.7

db:VUPENid:ADV-2007-3076

Trust: 1.7

db:SECTRACKid:1018660

Trust: 1.7

db:JVNDBid:JVNDB-2007-002609

Trust: 0.8

db:XFid:36473

Trust: 0.6

db:CNNVDid:CNNVD-200709-097

Trust: 0.6

db:VULHUBid:VHN-28148

Trust: 0.1

db:PACKETSTORMid:59114

Trust: 0.1

sources: CERT/CC: VU#563673 // VULHUB: VHN-28148 // BID: 25548 // JVNDB: JVNDB-2007-002609 // PACKETSTORM: 59114 // CNNVD: CNNVD-200709-097 // NVD: CVE-2007-4786

REFERENCES

url:http://www.kb.cert.org/vuls/id/563673

Trust: 2.9

url:http://www.kb.cert.org/vuls/id/mimg-74zk93

Trust: 2.1

url:http://www.securityfocus.com/bid/25548

Trust: 1.7

url:http://osvdb.org/37499

Trust: 1.7

url:http://www.securitytracker.com/id?1018660

Trust: 1.7

url:http://secunia.com/advisories/26677

Trust: 1.7

url:http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscsj72903

Trust: 1.6

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/3076

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36473

Trust: 1.1

url:http://secunia.com/advisories/26677/

Trust: 0.9

url:http://en.wikipedia.org/wiki/vlan

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4786

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/36473

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/3076

Trust: 0.6

url:http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscsj72903

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: CERT/CC: VU#563673 // VULHUB: VHN-28148 // BID: 25548 // JVNDB: JVNDB-2007-002609 // PACKETSTORM: 59114 // CNNVD: CNNVD-200709-097 // NVD: CVE-2007-4786

CREDITS

Lisa Sittler of CERT/CC is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 25548 // CNNVD: CNNVD-200709-097

SOURCES

db:CERT/CCid:VU#563673
db:VULHUBid:VHN-28148
db:BIDid:25548
db:JVNDBid:JVNDB-2007-002609
db:PACKETSTORMid:59114
db:CNNVDid:CNNVD-200709-097
db:NVDid:CVE-2007-4786

LAST UPDATE DATE

2025-01-18T23:16:57.960000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#563673date:2007-10-01T00:00:00
db:VULHUBid:VHN-28148date:2018-10-30T00:00:00
db:BIDid:25548date:2015-05-07T17:35:00
db:JVNDBid:JVNDB-2007-002609date:2024-02-22T01:12:00
db:CNNVDid:CNNVD-200709-097date:2007-10-26T00:00:00
db:NVDid:CVE-2007-4786date:2025-01-17T15:15:11.380

SOURCES RELEASE DATE

db:CERT/CCid:VU#563673date:2007-09-05T00:00:00
db:VULHUBid:VHN-28148date:2007-09-10T00:00:00
db:BIDid:25548date:2007-09-05T00:00:00
db:JVNDBid:JVNDB-2007-002609date:2012-06-26T00:00:00
db:PACKETSTORMid:59114date:2007-09-07T06:01:27
db:CNNVDid:CNNVD-200709-097date:2007-09-10T00:00:00
db:NVDid:CVE-2007-4786date:2007-09-10T21:17:00