This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2005-12-22
Product Pix Firewall Last view 2016-08-18
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:cisco:pix_firewall:6.1.5(104):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:pix_firewall:*:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:520_base:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:501_base:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:506_base:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:515_base:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:base:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:525_6.3:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:535_base:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:515e_base:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:pix_firewall:525_base:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
8.8 2016-08-18 CVE-2016-6366

Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.

5 2006-07-27 CVE-2006-3906

Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.

7.5 2006-05-09 CVE-2006-0515

Cisco PIX/ASA 7.1.x before 7.1(2) and 7.0.x before 7.0(5), PIX 6.3.x before 6.3.5(112), and FWSM 2.3.x before 2.3(4) and 3.x before 3.1(7), when used with Websense/N2H2, allows remote attackers to bypass HTTP access restrictions by splitting the GET method of an HTTP request into multiple packets, which prevents the request from being sent to Websense for inspection, aka bugs CSCsc67612, CSCsc68472, and CSCsd81734.

7.5 2005-12-22 CVE-2005-4499

The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.

CWE : Common Weakness Enumeration

%idName
100% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:5299 Cisco Multiple Products IKE Packet DoS

Open Source Vulnerability Database (OSVDB)

id Description
29068 Cisco Multiple Products IKE Phase-1 Packet Saturation DoS
25453 Cisco PIX/ASA/FWSM WebSense URL Filter Bypass
22193 Cisco Secure Access Control Server (ACS) RAS/NAS Downloadable IP ACL Disclosure

Snort® IPS/IDS

Date Description
2016-08-17 Cisco ASA SNMP OID parsing stack buffer overflow attempt
RuleID : 39885 - Type : PROTOCOL-SNMP - Revision : 4

Nessus® Vulnerability Scanner

id Description
2016-08-25 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCva92151-asa.nasl - Type: ACT_GATHER_INFO