ID

VAR-201205-0223


CVE

CVE-2012-0335


TITLE

Cisco Adaptive Security Appliances 5500 Vulnerability in which important information is obtained in series devices

Trust: 0.8

sources: JVNDB: JVNDB-2012-002202

DESCRIPTION

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746. The problem is Bug ID CSCtx42746 It is a problem.A third party may obtain important information through connection attempts. Cisco Adaptive Security Appliance is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain potentially sensitive information. Information obtained may aid in further attacks. This issue is tracked by Cisco BugId CSCtw89522. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Cisco ASA Cut-Through Proxy Authentication Information Disclosure Vulnerability SECUNIA ADVISORY ID: SA49139 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49139/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49139 RELEASE DATE: 2012-05-16 DISCUSS ADVISORY: http://secunia.com/advisories/49139/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49139/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49139 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an error within the cut-through proxy authentication and can be exploited to disclose certain information by tricking a user into authenticating. The vulnerability is reported in versions prior to interim release 8.4.3(8). SOLUTION: Update to interim release 8.4.3(8). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-0335 // JVNDB: JVNDB-2012-002202 // BID: 53558 // VULHUB: VHN-53616 // PACKETSTORM: 112817

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(1.11\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.3.1

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(2\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.3\(2\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(1\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(2.11\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.8\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.1

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(4.4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.7\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.16\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.10\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1\)

Trust: 1.0

vendor:ciscomodel:5500 series adaptive security appliancescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1.22\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.3.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(4.1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.18\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.48\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.15\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(3\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.19\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(3\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(3.9\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.3\(1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.17\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.14\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance 5500 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2 to 8.4

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.2.13

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.2.1

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1.2

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0.211

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1.2.25

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1(2)19

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1(2)14

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0.4.34

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0(4)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0

Trust: 0.3

sources: BID: 53558 // JVNDB: JVNDB-2012-002202 // CNNVD: CNNVD-201205-048 // NVD: CVE-2012-0335

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0335
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0335
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201205-048
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53616
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0335
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53616
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53616 // JVNDB: JVNDB-2012-002202 // CNNVD: CNNVD-201205-048 // NVD: CVE-2012-0335

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-53616 // JVNDB: JVNDB-2012-002202 // NVD: CVE-2012-0335

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201205-048

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201205-048

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002202

PATCH

title:Cisco ASA Interim Release Notesurl:http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-002202

EXTERNAL IDS

db:NVDid:CVE-2012-0335

Trust: 2.8

db:BIDid:53558

Trust: 1.4

db:SECUNIAid:49139

Trust: 1.2

db:SECTRACKid:1027008

Trust: 1.1

db:JVNDBid:JVNDB-2012-002202

Trust: 0.8

db:CNNVDid:CNNVD-201205-048

Trust: 0.7

db:NSFOCUSid:19648

Trust: 0.6

db:VULHUBid:VHN-53616

Trust: 0.1

db:PACKETSTORMid:112817

Trust: 0.1

sources: VULHUB: VHN-53616 // BID: 53558 // JVNDB: JVNDB-2012-002202 // PACKETSTORM: 112817 // CNNVD: CNNVD-201205-048 // NVD: CVE-2012-0335

REFERENCES

url:http://www.cisco.com/web/software/280775065/89203/asa-843-interim-release-notes.html

Trust: 2.1

url:http://www.securityfocus.com/bid/53558

Trust: 1.1

url:http://www.securitytracker.com/id?1027008

Trust: 1.1

url:http://secunia.com/advisories/49139

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0335

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0335

Trust: 0.8

url:http://www.nsfocus.net/vulndb/19648

Trust: 0.6

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/49139/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/49139/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49139

Trust: 0.1

sources: VULHUB: VHN-53616 // BID: 53558 // JVNDB: JVNDB-2012-002202 // PACKETSTORM: 112817 // CNNVD: CNNVD-201205-048 // NVD: CVE-2012-0335

CREDITS

Cisco

Trust: 0.3

sources: BID: 53558

SOURCES

db:VULHUBid:VHN-53616
db:BIDid:53558
db:JVNDBid:JVNDB-2012-002202
db:PACKETSTORMid:112817
db:CNNVDid:CNNVD-201205-048
db:NVDid:CVE-2012-0335

LAST UPDATE DATE

2024-11-23T22:02:41.146000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53616date:2012-11-06T00:00:00
db:BIDid:53558date:2012-05-16T00:00:00
db:JVNDBid:JVNDB-2012-002202date:2012-05-08T00:00:00
db:CNNVDid:CNNVD-201205-048date:2012-05-03T00:00:00
db:NVDid:CVE-2012-0335date:2024-11-21T01:34:49.253

SOURCES RELEASE DATE

db:VULHUBid:VHN-53616date:2012-05-02T00:00:00
db:BIDid:53558date:2012-05-16T00:00:00
db:JVNDBid:JVNDB-2012-002202date:2012-05-08T00:00:00
db:PACKETSTORMid:112817date:2012-05-17T11:19:16
db:CNNVDid:CNNVD-201205-048date:2012-05-03T00:00:00
db:NVDid:CVE-2012-0335date:2012-05-02T10:09:21.893