ID

VAR-201011-0069


CVE

CVE-2010-4354


TITLE

plural CIsco Run on product remote-access IPSec VPN Vulnerability that enumerates valid group names

Trust: 0.8

sources: JVNDB: JVNDB-2010-002565

DESCRIPTION

The remote-access IPSec VPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices, PIX Security Appliances 500 series devices, and VPN Concentrators 3000 series devices responds to an Aggressive Mode IKE Phase I message only when the group name is configured on the device, which allows remote attackers to enumerate valid group names via a series of IKE negotiation attempts, aka Bug ID CSCtj96108, a different vulnerability than CVE-2005-2025. The problem is Bug IDs CSCtj96108 It is a problem. This vulnerability CVE-2005-2025 Is a different vulnerability.By a third party IKE Valid group names may be enumerated through the negotiation series. Cisco IPSec VPN is prone to a remote groupname enumeration weakness. Attackers can exploit this issue to discover valid group names that may be used in group-based authentication. Successful exploits can aid the attacker in launching man-in-the-middle attacks against the affected device. This issue is tracked by Cisco Bug ID CSCtj96108. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Cisco IPsec VPN Implementation Group Name Enumeration Weakness SECUNIA ADVISORY ID: SA42414 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42414/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42414 RELEASE DATE: 2010-12-01 DISCUSS ADVISORY: http://secunia.com/advisories/42414/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42414/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42414 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness has been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to gain knowledge of certain information. The problem is that the device returns different responses depending on whether or not a valid group name is supplied when the device is configured for group name authentication and using a pre-shared key. This is related to: SA15765 SOLUTION: Update to a fixed version when it becomes available. Please see the vendor's advisory for more details. PROVIDED AND/OR DISCOVERED BY: The vendor credits Gavin Jones, NGS Secure. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_response09186a0080b5992c.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2010-4354 // JVNDB: JVNDB-2010-002565 // BID: 45161 // VULHUB: VHN-46959 // PACKETSTORM: 96244

AFFECTED PRODUCTS

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.5.2

Trust: 1.5

vendor:ciscomodel:vpn 3060 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3080 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:asa 5500scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3020 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3030 concentatorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3005 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix 500scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3015 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:eqversion:5500 series adaptive security appliances

Trust: 0.8

vendor:ciscomodel:pix 500 series security appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:vpn 3000 seriesscope:eqversion:concentrators

Trust: 0.8

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.3

Trust: 0.6

vendor:ciscomodel:pix 500scope: - version: -

Trust: 0.6

vendor:ciscomodel:asa 5500scope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3060 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3020 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3005 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3030 concentatorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3080 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3015 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.3

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.2)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.x

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(1.6)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.4

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30304.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.ascope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30304.7.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.45)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4.3

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.4

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.1.2.61

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30604.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(0.08)

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.0(4)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.13)

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30604.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30804.7.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.35)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.2.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30604.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.0.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.17)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30204.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.39)

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(4.46)

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30154.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30804.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30603.5.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(4.44)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0(2)

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.0.5

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.1)

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3060

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3020

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30054.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.4

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0(8.11)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30154.7.1

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30804.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30304.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.1.x

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.10)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30604.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30054.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30204.1.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0(0)

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30304.7

Trust: 0.3

vendor:ciscomodel:vpn hardware clientscope:eqversion:3002

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(5)

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30804.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30004.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3030

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.46)

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30204.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30004.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30154.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(4.38)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2.2.34

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.1.5

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30604.7.1

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.16)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1.2.25

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.44)

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.bscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0(4)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.5

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.17)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.10)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1(2)19

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.19)

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30604.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30804.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.29)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0.211

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1(2)14

Trust: 0.3

vendor:ciscomodel:vpn concentrator bscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3080

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30804.7.1

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0.4.34

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30010

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.37)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(1.1)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.1

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30054.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30204.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30604.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.6)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(4.44)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30204.7.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:eqversion:30804.1.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30154.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30604.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator dscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30804.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.3

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0(4)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30054.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.1)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30204.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3015

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.5)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.15)

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:eqversion:30804.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30154.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.7)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30154.1.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0(8.10)

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(4.45)

Trust: 0.3

vendor:ciscomodel:vpn concentrator cscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.0.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.15)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator dscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.40)

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.5

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.2.13

Trust: 0.3

sources: BID: 45161 // JVNDB: JVNDB-2010-002565 // CNNVD: CNNVD-201011-280 // NVD: CVE-2010-4354

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4354
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-4354
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201011-280
value: MEDIUM

Trust: 0.6

VULHUB: VHN-46959
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-4354
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2010-4354
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-46959
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-46959 // JVNDB: JVNDB-2010-002565 // CNNVD: CNNVD-201011-280 // NVD: CVE-2010-4354

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

problemtype:CWE-399

Trust: 0.8

sources: VULHUB: VHN-46959 // JVNDB: JVNDB-2010-002565 // NVD: CVE-2010-4354

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201011-280

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201011-280

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002565

PATCH

title:cisco-sr-20101124-vpn-grpnameurl:http://www.cisco.com/warp/public/707/cisco-sr-20101124-vpn-grpname.shtml

Trust: 0.8

title:21956url:http://tools.cisco.com/security/center/viewAlert.x?alertId=21956

Trust: 0.8

title:cisco-sr-20101124-vpn-grpnameurl:http://www.cisco.com/JP/support/public/ht/security/109/1099798/cisco-sr-20101124-vpn-grpname-j.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2010-002565

EXTERNAL IDS

db:NVDid:CVE-2010-4354

Trust: 2.8

db:SECUNIAid:42414

Trust: 0.9

db:JVNDBid:JVNDB-2010-002565

Trust: 0.8

db:CNNVDid:CNNVD-201011-280

Trust: 0.7

db:CISCOid:20101129 CISCO IPSEC VPN IMPLEMENTATION GROUP NAME ENUMERATION VULNERABILITY

Trust: 0.6

db:BIDid:45161

Trust: 0.4

db:VULHUBid:VHN-46959

Trust: 0.1

db:PACKETSTORMid:96244

Trust: 0.1

sources: VULHUB: VHN-46959 // BID: 45161 // JVNDB: JVNDB-2010-002565 // PACKETSTORM: 96244 // CNNVD: CNNVD-201011-280 // NVD: CVE-2010-4354

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_response09186a0080b5992c.html

Trust: 2.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4354

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4354

Trust: 0.8

url:http://secunia.com/advisories/42414

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/514978

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/42414/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/42414/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42414

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-46959 // BID: 45161 // JVNDB: JVNDB-2010-002565 // PACKETSTORM: 96244 // CNNVD: CNNVD-201011-280 // NVD: CVE-2010-4354

CREDITS

Gavin Jones of NGS Secure

Trust: 0.3

sources: BID: 45161

SOURCES

db:VULHUBid:VHN-46959
db:BIDid:45161
db:JVNDBid:JVNDB-2010-002565
db:PACKETSTORMid:96244
db:CNNVDid:CNNVD-201011-280
db:NVDid:CVE-2010-4354

LAST UPDATE DATE

2024-11-23T22:09:03.665000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-46959date:2010-12-01T00:00:00
db:BIDid:45161date:2015-03-19T08:52:00
db:JVNDBid:JVNDB-2010-002565date:2011-01-04T00:00:00
db:CNNVDid:CNNVD-201011-280date:2010-12-02T00:00:00
db:NVDid:CVE-2010-4354date:2024-11-21T01:20:45.830

SOURCES RELEASE DATE

db:VULHUBid:VHN-46959date:2010-11-30T00:00:00
db:BIDid:45161date:2010-11-29T00:00:00
db:JVNDBid:JVNDB-2010-002565date:2011-01-04T00:00:00
db:PACKETSTORMid:96244date:2010-11-30T08:21:29
db:CNNVDid:CNNVD-201011-280date:2010-11-30T00:00:00
db:NVDid:CVE-2010-4354date:2010-11-30T22:14:00.913