ID

VAR-201405-0472


CVE

CVE-2014-2195


TITLE

Cisco Email Security Appliance Remote Security Bypass Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2014-03188 // BID: 67494

DESCRIPTION

Cisco AsyncOS on Email Security Appliance (ESA) and Content Security Management Appliance (SMA) devices, when Active Directory is enabled, does not properly handle group names, which allows remote attackers to gain role privileges by leveraging group-name similarity, aka Bug ID CSCum86085. Vendors have confirmed this vulnerability Bug ID CSCum86085 It is released as.A third party could gain the role's privileges by using the similarity of group names. The Cisco Email Security Appliance is an EMAIL security gateway from Cisco. AsyncOS is the operating system used by the product to handle bottlenecks in concurrent communications and file-based mail queues. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This issue is being tracked by Cisco Bug ID CSCum86085. A remote attacker could exploit this vulnerability to gain privileges

Trust: 2.52

sources: NVD: CVE-2014-2195 // JVNDB: JVNDB-2014-002548 // CNVD: CNVD-2014-03188 // BID: 67494 // VULHUB: VHN-70134

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-03188

AFFECTED PRODUCTS

vendor:ciscomodel:asyncosscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asyncosscope:lteversion:7.6(.2)

Trust: 0.8

vendor:ciscomodel:e email security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:content security management appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:email security appliancescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2014-03188 // JVNDB: JVNDB-2014-002548 // CNNVD: CNNVD-201405-381 // NVD: CVE-2014-2195

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2195
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-2195
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-03188
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201405-381
value: MEDIUM

Trust: 0.6

VULHUB: VHN-70134
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-2195
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-03188
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70134
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-03188 // VULHUB: VHN-70134 // JVNDB: JVNDB-2014-002548 // CNNVD: CNNVD-201405-381 // NVD: CVE-2014-2195

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70134 // JVNDB: JVNDB-2014-002548 // NVD: CVE-2014-2195

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201405-381

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201405-381

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002548

PATCH

title:Cisco AsyncOS Software Administration Role Authorization Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2195

Trust: 0.8

title:34294url:http://tools.cisco.com/security/center/viewAlert.x?alertId=34294

Trust: 0.8

title:Cisco Email Security Appliance Remote Security Bypass Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/45845

Trust: 0.6

sources: CNVD: CNVD-2014-03188 // JVNDB: JVNDB-2014-002548

EXTERNAL IDS

db:NVDid:CVE-2014-2195

Trust: 3.4

db:SECTRACKid:1030258

Trust: 1.1

db:BIDid:67494

Trust: 1.0

db:JVNDBid:JVNDB-2014-002548

Trust: 0.8

db:CNNVDid:CNNVD-201405-381

Trust: 0.7

db:CNVDid:CNVD-2014-03188

Trust: 0.6

db:CISCOid:20140519 CISCO ASYNCOS SOFTWARE ADMINISTRATION ROLE AUTHORIZATION VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-70134

Trust: 0.1

sources: CNVD: CNVD-2014-03188 // VULHUB: VHN-70134 // BID: 67494 // JVNDB: JVNDB-2014-002548 // CNNVD: CNNVD-201405-381 // NVD: CVE-2014-2195

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-2195

Trust: 2.3

url:http://www.securitytracker.com/id/1030258

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2195

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2195

Trust: 0.8

url:www.cisco.com

Trust: 0.3

sources: CNVD: CNVD-2014-03188 // VULHUB: VHN-70134 // BID: 67494 // JVNDB: JVNDB-2014-002548 // CNNVD: CNNVD-201405-381 // NVD: CVE-2014-2195

CREDITS

Cisco

Trust: 0.3

sources: BID: 67494

SOURCES

db:CNVDid:CNVD-2014-03188
db:VULHUBid:VHN-70134
db:BIDid:67494
db:JVNDBid:JVNDB-2014-002548
db:CNNVDid:CNNVD-201405-381
db:NVDid:CVE-2014-2195

LAST UPDATE DATE

2024-11-23T23:09:23.113000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-03188date:2014-05-23T00:00:00
db:VULHUBid:VHN-70134date:2018-10-30T00:00:00
db:BIDid:67494date:2014-05-21T00:43:00
db:JVNDBid:JVNDB-2014-002548date:2014-05-21T00:00:00
db:CNNVDid:CNNVD-201405-381date:2014-05-23T00:00:00
db:NVDid:CVE-2014-2195date:2024-11-21T02:05:49.797

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-03188date:2014-05-23T00:00:00
db:VULHUBid:VHN-70134date:2014-05-20T00:00:00
db:BIDid:67494date:2014-05-19T00:00:00
db:JVNDBid:JVNDB-2014-002548date:2014-05-21T00:00:00
db:CNNVDid:CNNVD-201405-381date:2014-05-23T00:00:00
db:NVDid:CVE-2014-2195date:2014-05-20T11:13:37.593