Executive Summary
Summary | |
---|---|
Title | Cisco IronPort Appliances Telnet Remote Code Execution Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20120126-ironport | First vendor Publication | 2012-01-26 |
Vendor | Cisco | Last vendor Modification | 2014-10-16 |
Severity (Vendor) | N/A | Revision | 2.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco AsyncOS Software for Cisco Web Security Appliance (WSA), Cisco Email Security Appliance (ESA), and Cisco Content Security Management Appliance (SMA) contain a vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code with elevated privileges. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. Note: This security advisory has been updated to include important information about Cisco WSA This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120126-ironport BEGIN PGP SIGNATURE Version: GnuPG v1.4.5 (SunOS) iQIVAwUBVD/SX4pI1I6i1Mx3AQI3uxAAoomtbVBoF6/e3zVswST5DDoYvP+quQJy FJp4nO1FCeEZr9k+4v2zHN2gf8JGF/fRhdvfTFk+ZGlm0eVzZ27SJt0k05szAl9F T6FFiwv8rbxaax1zFDvoiBblTnJYATpgPef4Gbp/pMtV+h5iEIXEclknejAxuI1h /WEcO5AEz3moelkc4wLOfsN/8/BFj5Gmu/fnv+9bhsZmPRYlGIh1swD43u0U+42C 7QX70kEOXO7p1pA6oOqpFlrXJAEU5q1D56QXCSejruE9umHLGUfPIndMzC2DzTgv J5GRXiH/HFQx6bBJ3KhC/ZPVlZ5CM9TbNt3aWsZoW2ekpJJ2VC4Noiq2ae7UzsnY r4EmffCN+Lzqx8UExy3FYLt/k043BwrHVr+P1wMfvjIRwnz3oKPuqUA1vdSLxn+s Vf9fXzqxuVm4bMfiAgT3JzRm/Z9m+ZYuPAR5CoDp/TqrKb28t2n59kzvMuT4jzJ9 yos+96pVTEmTcqiixnvvb6oRCfCW7/CotWD+rfc5JJ/ylD3IsNVLo8Me2Mmv7jCi CcCY2sQ5amR8qqY3JXOxfrpcW2AhgBLIwJvMdSt/Q2oDhmS1KwqSLve5nzGMRiy8 p0D3TTnU3ed9gjt3wH7T56UeYgvSK61RpYUBNdrLzzbxvl44T0KfwtZZJt8ogDmy 9vfd06IfcoU= =thvy END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
Alert History
Date | Informations |
---|---|
2014-11-18 13:25:33 |
|
2014-10-17 17:23:32 |
|