Executive Summary

Informations
Name CVE-2014-3410 First vendor Publication 2014-12-19
Vendor Cve Last vendor Modification 2023-08-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The syslog-management subsystem in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to obtain an administrator password by waiting for an administrator to copy a file, and then (1) sniffing the network for a syslog message or (2) reading a syslog message in a file on a syslog server, aka Bug IDs CSCuq22357 and CSCur41860.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3410

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1

Sources (Detail)

Source Url
CISCO http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2023-08-12 05:28:56
  • Multiple Updates
2021-05-04 12:31:32
  • Multiple Updates
2021-04-22 01:38:46
  • Multiple Updates
2020-05-23 00:41:01
  • Multiple Updates
2014-12-22 21:23:49
  • Multiple Updates
2014-12-20 05:29:02
  • First insertion