This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2007-05-02
Product Adaptive Security Appliance Software Last view 2023-11-01
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:cisco:adaptive_security_appliance_software:1.6.0:*:*:*:*:*:*:* 131
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(1.22):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(4):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(5):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1(2):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(5.2):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(6.7):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1(2.5):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1(2.27):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1(2.48):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1(2.49):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(1):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(2):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.7):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.8):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.10):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.14):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.15):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.16):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.17):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.19):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1(5):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.5):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.18):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(2.48):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(3):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(8):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(1):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(7):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(0):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0(6):*:*:*:*:*:*:* 130
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(4):*:*:*:*:*:*:* 129
cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2(5):*:*:*:*:*:*:* 129
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0(5):*:*:*:*:*:*:* 126
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0(5.31):*:*:*:*:*:*:* 126
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0(3):*:*:*:*:*:*:* 126
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0(4):*:*:*:*:*:*:* 126
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0(2):*:*:*:*:*:*:* 126
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0(5.28):*:*:*:*:*:*:* 126
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.1(2.5):*:*:*:*:*:*:* 125
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2(1):*:*:*:*:*:*:* 125
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.1%282.5%29:*:*:*:*:*:*:* 125
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2(2):*:*:*:*:*:*:* 116
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2(3):*:*:*:*:*:*:* 114
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2(3.9):*:*:*:*:*:*:* 114
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2(5.35):*:*:*:*:*:*:* 111
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2(4):*:*:*:*:*:*:* 111
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2(5.38):*:*:*:*:*:*:* 111

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.1 2023-11-01 CVE-2023-20264

A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 single sign-on (SSO) for remote access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to intercept the SAML assertion of a user who is authenticating to a remote access VPN session. This vulnerability is due to insufficient validation of the login URL. An attacker could exploit this vulnerability by persuading a user to access a site that is under the control of the attacker, allowing the attacker to modify the login URL. A successful exploit could allow the attacker to intercept a successful SAML assertion and use that assertion to establish a remote access VPN session toward the affected device with the identity and permissions of the hijacked user, resulting in access to the protected network.

7.5 2022-08-10 CVE-2022-20866

A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This vulnerability is due to a logic error when the RSA key is stored in memory on a hardware platform that performs hardware-based cryptography. An attacker could exploit this vulnerability by using a Lenstra side-channel attack against the targeted device. A successful exploit could allow the attacker to retrieve the RSA private key. The following conditions may be observed on an affected device: This vulnerability will apply to approximately 5 percent of the RSA keys on a device that is running a vulnerable release of Cisco ASA Software or Cisco FTD Software; not all RSA keys are expected to be affected due to mathematical calculations applied to the RSA key. The RSA key could be valid but have specific characteristics that make it vulnerable to the potential leak of the RSA private key. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic. See the Indicators of Compromise section for more information on the detection of this type of RSA key. The RSA key could be malformed and invalid. A malformed RSA key is not functional, and a TLS client connection to a device that is running Cisco ASA Software or Cisco FTD Software that uses the malformed RSA key will result in a TLS signature failure, which means a vulnerable software release created an invalid RSA signature that failed verification. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic.

7.5 2022-05-03 CVE-2022-20760

A vulnerability in the DNS inspection handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service condition (DoS) on an affected device. This vulnerability is due to a lack of proper processing of incoming requests. An attacker could exploit this vulnerability by sending crafted DNS requests at a high rate to an affected device. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a DoS condition.

8.8 2022-05-03 CVE-2022-20759

A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, but unprivileged, remote attacker to elevate privileges to level 15. This vulnerability is due to improper separation of authentication and authorization scopes. An attacker could exploit this vulnerability by sending crafted HTTPS messages to the web services interface of an affected device. A successful exploit could allow the attacker to gain privilege level 15 access to the web management interface of the device. This includes privilege level 15 access to the device using management tools like the Cisco Adaptive Security Device Manager (ASDM) or the Cisco Security Manager (CSM). Note: With Cisco FTD Software, the impact is lower than the CVSS score suggests because the affected web management interface allows for read access only.

7.5 2022-05-03 CVE-2022-20745

A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

7.4 2022-05-03 CVE-2022-20742

A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel.

7.1 2022-05-03 CVE-2022-20737

A vulnerability in the handler for HTTP authentication for resources accessed through the Clientless SSL VPN portal of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device or to obtain portions of process memory from an affected device. This vulnerability is due to insufficient bounds checking when parsing specific HTTP authentication messages. An attacker could exploit this vulnerability by sending malicious traffic to an affected device acting as a VPN Gateway. To send this malicious traffic, an attacker would need to control a web server that can be accessed through the Clientless SSL VPN portal. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition, or to retrieve bytes from the device process memory that may contain sensitive information.

8.6 2022-05-03 CVE-2022-20715

A vulnerability in the remote access SSL VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper validation of errors that are logged as a result of client connections that are made using remote access VPN. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.

7.5 2022-04-21 CVE-2022-20795

A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition. This vulnerability is due to suboptimal processing that occurs when establishing a DTLS tunnel as part of an AnyConnect SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted DTLS traffic to an affected device. A successful exploit could allow the attacker to exhaust resources on the affected VPN headend device. This could cause existing DTLS tunnels to stop passing traffic and prevent new DTLS tunnels from establishing, resulting in a DoS condition. Note: When the attack traffic stops, the device recovers gracefully.

7.5 2022-01-11 CVE-2021-34704

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

7.5 2022-01-11 CVE-2021-1573

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

6.5 2021-10-27 CVE-2021-40125

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device.

7.5 2021-10-27 CVE-2021-40118

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

7.5 2021-10-27 CVE-2021-40117

A vulnerability in SSL/TLS message handler for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because incoming SSL/TLS packets are not properly processed. An attacker could exploit this vulnerability by sending a crafted SSL/TLS packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

5.3 2021-10-27 CVE-2021-34794

A vulnerability in the Simple Network Management Protocol version 3 (SNMPv3) access control functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to query SNMP data. This vulnerability is due to ineffective access control. An attacker could exploit this vulnerability by sending an SNMPv3 query to an affected device from a host that is not permitted by the SNMPv3 access control list. A successful exploit could allow the attacker to send an SNMP query to an affected device and retrieve information from the device. The attacker would need valid credentials to perform the SNMP query.

8.6 2021-10-27 CVE-2021-34793

A vulnerability in the TCP Normalizer of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software operating in transparent mode could allow an unauthenticated, remote attacker to poison MAC address tables, resulting in a denial of service (DoS) vulnerability. This vulnerability is due to incorrect handling of certain TCP segments when the affected device is operating in transparent mode. An attacker could exploit this vulnerability by sending a crafted TCP segment through an affected device. A successful exploit could allow the attacker to poison the MAC address tables in adjacent devices, resulting in network disruption.

7.5 2021-10-27 CVE-2021-34792

A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

5.3 2021-10-27 CVE-2021-34791

Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.

5.3 2021-10-27 CVE-2021-34790

Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.

5.3 2021-10-27 CVE-2021-34787

A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts.

7.5 2021-10-27 CVE-2021-34783

A vulnerability in the software-based SSL/TLS message handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient validation of SSL/TLS messages when the device performs software-based SSL/TLS decryption. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Datagram TLS (DTLS) messages cannot be used to exploit this vulnerability.

7.5 2021-04-29 CVE-2021-1504

Multiple vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to lack of proper input validation of the HTTPS request. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section.

7.5 2021-04-29 CVE-2021-1501

A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.The vulnerability is due to a crash that occurs during a hash lookup for a SIP pinhole connection. An attacker could exploit this vulnerability by sending crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a crash and reload of the affected device.

7.1 2021-04-29 CVE-2021-1493

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a buffer overflow on an affected system. The vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a malicious HTTP request. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could disclose data fragments or cause the device to reload, resulting in a denial of service (DoS) condition.

6.7 2021-04-29 CVE-2021-1488

A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
18% (20) CWE-20 Improper Input Validation
14% (16) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
11% (12) CWE-399 Resource Management Errors
6% (7) CWE-787 Out-of-bounds Write
6% (7) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
5% (6) CWE-264 Permissions, Privileges, and Access Controls
3% (4) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
3% (4) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
2% (3) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (2) CWE-755 Improper Handling of Exceptional Conditions
1% (2) CWE-404 Improper Resource Shutdown or Release
1% (2) CWE-203 Information Exposure Through Discrepancy
1% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
0% (1) CWE-772 Missing Release of Resource after Effective Lifetime
0% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (1) CWE-704 Incorrect Type Conversion or Cast
0% (1) CWE-667 Insufficient Locking
0% (1) CWE-436 Interpretation Conflict
0% (1) CWE-434 Unrestricted Upload of File with Dangerous Type
0% (1) CWE-415 Double Free
0% (1) CWE-352 Cross-Site Request Forgery (CSRF)
0% (1) CWE-345 Insufficient Verification of Data Authenticity
0% (1) CWE-327 Use of a Broken or Risky Cryptographic Algorithm
0% (1) CWE-319 Cleartext Transmission of Sensitive Information
0% (1) CWE-295 Certificate Issues

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-37 Lifting Data Embedded in Client Distributions
CAPEC-65 Passively Sniff and Capture Application Code Bound for Authorized Client
CAPEC-102 Session Sidejacking
CAPEC-117 Data Interception Attacks
CAPEC-155 Screen Temporary Files for Sensitive Information
CAPEC-157 Sniffing Attacks
CAPEC-167 Lifting Sensitive Data from the Client
CAPEC-204 Lifting cached, sensitive data embedded in client distributions (thick or thin)
CAPEC-205 Lifting credential(s)/key material embedded in client distributions (thick or...
CAPEC-258 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-259 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-260 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
72594 Cisco Multiple Products Crafted Cisco Discovery Protocol (CDP) Packet Handlin...
72584 Cisco Multiple Products Transparent Firewall Mode IPv6 Traffic Handling Exhau...
72582 Cisco Multiple Products Malformed Skinny Client Control Protocol (SCCP) Messa...
70364 Cisco Adaptive Security Appliances (ASA) IPv6 Stack Neighbor Discovery Router...
70362 Cisco Adaptive Security Appliances (ASA) EIGRP Multicast Storm Remote DoS
70361 Cisco Adaptive Security Appliances (ASA) Packet Saturation Remote DoS
70360 Cisco Adaptive Security Appliances (ASA) Multicast Traffic Unspecified Remote...
70359 Cisco Adaptive Security Appliances (ASA) TELNET Connection Interface Remote A...
70358 Cisco Adaptive Security Appliances (ASA) IPsec Traffic Saturation Remote DoS
70357 Cisco Adaptive Security Appliances (ASA) emWEB Document Name Space Character ...
70356 Cisco Adaptive Security Appliances (ASA) Configuration Pre-load Network Packe...
70355 Cisco Adaptive Security Appliances (ASA) OCSP Responder Connection Rejection ...
70354 Cisco Adaptive Security Appliances (ASA) WebVPN CIFS Share Access Restriction...
70353 Cisco Adaptive Security Appliances (ASA) Space Character SMTP Inspection Bypass
70352 Cisco Adaptive Security Appliances (ASA) Incorrect LDAP Authentication Attemp...
70346 Cisco Adaptive Security Appliances (ASA) SIP Inspection Feature Multiple SIP ...
70345 Cisco Adaptive Security Appliances (ASA) Unspecified Network Traffic Post-mig...
70344 Cisco Adaptive Security Appliances (ASA) Mobile User Security Service HTTP HE...
70343 Cisco Adaptive Security Appliances (ASA) Multicast Traffic Unspecified Remote...
70342 Cisco Adaptive Security Appliances (ASA) LAN-to-LAN IPsec Session Saturation ...
70338 Cisco Adaptive Security Appliances (ASA) Long URL ASDM Syslog Outage Remote DoS
40640 Cisco PIX / ASA Crafted IP Packet Time-To-Live DoS
37499 Cisco Adaptive Security Appliance (ASA) PIX Cleartext Password Remote Disclosure
35333 Cisco PIX / ASA Crafted Clientless SSL Connection Race Condition DoS
35332 Cisco PIX / ASA Unspecified VPN Connection DoS

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-12-08 Cisco ASA/FTD OSPF LLS denial of service attempt
RuleID : 56091 - Type : SERVER-OTHER - Revision : 2
2020-12-08 Cisco ASA/FTD OSPF LLS denial of service attempt
RuleID : 56090 - Type : SERVER-OTHER - Revision : 1
2020-12-08 Cisco ASA and FTD denial of service attempt
RuleID : 56089 - Type : SERVER-WEBAPP - Revision : 1
2020-12-08 Cisco ASA and FTD web services large file upload denial of service attempt
RuleID : 56087 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco ASA directory traversal attempt
RuleID : 54601 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco ASA directory traversal attempt
RuleID : 54600 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco ASA directory traversal attempt
RuleID : 54599 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco ASA directory traversal attempt
RuleID : 54598 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco ASA and FTD MGCP denial of service attempt
RuleID : 53871 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco ASA and FTD MGCP denial of service attempt
RuleID : 53870 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco ASA and FTD MGCP denial of service attempt
RuleID : 53869 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco ASA and FTD MGCP denial of service attempt
RuleID : 53868 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco ASA and FTD IPv6 DNS request stack buffer overflow attempt
RuleID : 53867 - Type : PROTOCOL-DNS - Revision : 1
2020-12-05 Cisco ASA and FTD directory traversal attempt
RuleID : 53851 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco ASA and FTD memory disclosure attempt
RuleID : 53850 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco ASA and FTD malformed OSPF denial of service attempt
RuleID : 53847 - Type : PROTOCOL-OTHER - Revision : 1
2020-12-05 Cisco WebVPN cross site scripting attempt
RuleID : 51729 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco WebVPN cross site scripting attempt
RuleID : 51728 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco WebVPN denial of service attempt
RuleID : 51713 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco ASA running configuration download request detected
RuleID : 50902 - Type : POLICY-OTHER - Revision : 2
2020-12-05 Cisco ASA WebVPN expired session page direct access denial of service attempt
RuleID : 50007 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Adaptive Security Appliance admin command interface access attempt
RuleID : 49999 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Adaptive Security Appliance admin command interface access attempt
RuleID : 49998 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco ASA secure desktop login denial of service attempt
RuleID : 49996 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Adaptive Security Appliance admin REST API access attempt
RuleID : 48644 - Type : POLICY-OTHER - Revision : 1

Nessus® Vulnerability Scanner

id Description
2018-12-21 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20181219-asa-privesc.nasl - Type: ACT_GATHER_INFO
2018-11-08 Name: The packet inspection software installed on the remote host is affected by a ...
File: cisco-sa-20181031-asaftd-sip-dos-ftd.nasl - Type: ACT_GATHER_INFO
2018-11-08 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20181031-asaftd-sip-dos-asa.nasl - Type: ACT_GATHER_INFO
2018-06-25 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180606-asa.nasl - Type: ACT_GATHER_INFO
2018-04-27 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180418-asa1.nasl - Type: ACT_GATHER_INFO
2018-02-26 Name: The remote device is missing a vendor-supplied security patch.
File: cisco_asa_cve-2018-0101_dos.nasl - Type: ACT_KILL_HOST
2018-02-06 Name: The packet inspection software installed on the remote host is affected by a ...
File: cisco-sa-20180129-asa1-ftd.nasl - Type: ACT_GATHER_INFO
2018-01-30 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180129-asa1.nasl - Type: ACT_GATHER_INFO
2016-07-29 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160711.nasl - Type: ACT_GATHER_INFO
2014-12-08 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CVE-2014-3407-asa.nasl - Type: ACT_GATHER_INFO
2014-12-02 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CVE-2014-3399-asa.nasl - Type: ACT_GATHER_INFO
2014-10-29 Name: The remote Fedora host is missing a security update.
File: fedora_2014-13030.nasl - Type: ACT_GATHER_INFO
2014-10-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20141008-asa.nasl - Type: ACT_GATHER_INFO
2014-08-28 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCuj83344-asa.nasl - Type: ACT_GATHER_INFO
2014-07-18 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCui45606-asa.nasl - Type: ACT_GATHER_INFO
2014-06-11 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCun69561-asa.nasl - Type: ACT_GATHER_INFO
2012-07-27 Name: The videoconferencing switch running on the remote host is affected by multip...
File: cisco_tms_web_1_7_0.nasl - Type: ACT_GATHER_INFO
2011-03-09 Name: The remote security device is missing a vendor-supplied security patch.
File: cisco-sa-20110223-asa.nasl - Type: ACT_GATHER_INFO