ID

VAR-201401-0359


CVE

CVE-2014-0653


TITLE

Cisco Adaptive Security Appliance Software Identity Firewall Vulnerabilities that trigger changes in authentication status in functions

Trust: 0.8

sources: JVNDB: JVNDB-2014-001011

DESCRIPTION

The Identity Firewall (IDFW) functionality in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to trigger authentication-state modifications via a crafted NetBIOS logout probe response, aka Bug ID CSCuj45340. Successfully exploiting this issue will allow an attacker to perform certain unauthorized actions. This may lead to other attacks. This issue is being tracked by Cisco Bug ID CSCuj45340. A remote attacker could exploit this vulnerability to affect the current authorized user's access

Trust: 1.98

sources: NVD: CVE-2014-0653 // JVNDB: JVNDB-2014-001011 // BID: 64708 // VULHUB: VHN-68146

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliancescope: - version: -

Trust: 1.4

vendor:ciscomodel:adaptive security appliancescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:lteversion:9.1(.3)

Trust: 0.8

sources: JVNDB: JVNDB-2014-001011 // CNNVD: CNNVD-201401-106 // NVD: CVE-2014-0653

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0653
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-0653
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201401-106
value: MEDIUM

Trust: 0.6

VULHUB: VHN-68146
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-0653
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-68146
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-68146 // JVNDB: JVNDB-2014-001011 // CNNVD: CNNVD-201401-106 // NVD: CVE-2014-0653

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-68146 // JVNDB: JVNDB-2014-001011 // NVD: CVE-2014-0653

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201401-106

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201401-106

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001011

PATCH

title:Cisco Adaptive Security Appliance Identity Firewall NetBIOS Logout Probe Auth State Change Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0653

Trust: 0.8

title:32363url:http://tools.cisco.com/security/center/viewAlert.x?alertId=32363

Trust: 0.8

sources: JVNDB: JVNDB-2014-001011

EXTERNAL IDS

db:NVDid:CVE-2014-0653

Trust: 2.8

db:BIDid:64708

Trust: 1.4

db:OSVDBid:101834

Trust: 1.1

db:SECTRACKid:1029570

Trust: 1.1

db:SECUNIAid:56366

Trust: 1.1

db:JVNDBid:JVNDB-2014-001011

Trust: 0.8

db:CNNVDid:CNNVD-201401-106

Trust: 0.7

db:CISCOid:20140107 CISCO ADAPTIVE SECURITY APPLIANCE IDENTITY FIREWALL NETBIOS LOGOUT PROBE AUTH STATE CHANGE VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-68146

Trust: 0.1

sources: VULHUB: VHN-68146 // BID: 64708 // JVNDB: JVNDB-2014-001011 // CNNVD: CNNVD-201401-106 // NVD: CVE-2014-0653

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-0653

Trust: 1.7

url:http://www.securityfocus.com/bid/64708

Trust: 1.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=32363

Trust: 1.1

url:http://osvdb.org/101834

Trust: 1.1

url:http://www.securitytracker.com/id/1029570

Trust: 1.1

url:http://secunia.com/advisories/56366

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/90165

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0653

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0653

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-68146 // BID: 64708 // JVNDB: JVNDB-2014-001011 // CNNVD: CNNVD-201401-106 // NVD: CVE-2014-0653

CREDITS

Cisco

Trust: 0.3

sources: BID: 64708

SOURCES

db:VULHUBid:VHN-68146
db:BIDid:64708
db:JVNDBid:JVNDB-2014-001011
db:CNNVDid:CNNVD-201401-106
db:NVDid:CVE-2014-0653

LAST UPDATE DATE

2024-11-23T22:39:03.710000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-68146date:2017-08-29T00:00:00
db:BIDid:64708date:2014-01-07T00:00:00
db:JVNDBid:JVNDB-2014-001011date:2014-01-10T00:00:00
db:CNNVDid:CNNVD-201401-106date:2014-01-09T00:00:00
db:NVDid:CVE-2014-0653date:2024-11-21T02:02:35.630

SOURCES RELEASE DATE

db:VULHUBid:VHN-68146date:2014-01-08T00:00:00
db:BIDid:64708date:2014-01-07T00:00:00
db:JVNDBid:JVNDB-2014-001011date:2014-01-10T00:00:00
db:CNNVDid:CNNVD-201401-106date:2014-01-09T00:00:00
db:NVDid:CVE-2014-0653date:2014-01-08T21:55:06.270