Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2013-11-13 |
Product | Adaptive Security Appliance Software | Last view | 2023-11-01 |
Version | 8.5(1.4) | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:cisco:adaptive_security_appliance_software |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.1 | 2023-11-01 | CVE-2023-20264 | A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 single sign-on (SSO) for remote access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to intercept the SAML assertion of a user who is authenticating to a remote access VPN session. This vulnerability is due to insufficient validation of the login URL. An attacker could exploit this vulnerability by persuading a user to access a site that is under the control of the attacker, allowing the attacker to modify the login URL. A successful exploit could allow the attacker to intercept a successful SAML assertion and use that assertion to establish a remote access VPN session toward the affected device with the identity and permissions of the hijacked user, resulting in access to the protected network. |
7.5 | 2022-08-10 | CVE-2022-20866 | A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This vulnerability is due to a logic error when the RSA key is stored in memory on a hardware platform that performs hardware-based cryptography. An attacker could exploit this vulnerability by using a Lenstra side-channel attack against the targeted device. A successful exploit could allow the attacker to retrieve the RSA private key. The following conditions may be observed on an affected device: This vulnerability will apply to approximately 5 percent of the RSA keys on a device that is running a vulnerable release of Cisco ASA Software or Cisco FTD Software; not all RSA keys are expected to be affected due to mathematical calculations applied to the RSA key. The RSA key could be valid but have specific characteristics that make it vulnerable to the potential leak of the RSA private key. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic. See the Indicators of Compromise section for more information on the detection of this type of RSA key. The RSA key could be malformed and invalid. A malformed RSA key is not functional, and a TLS client connection to a device that is running Cisco ASA Software or Cisco FTD Software that uses the malformed RSA key will result in a TLS signature failure, which means a vulnerable software release created an invalid RSA signature that failed verification. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic. |
7.5 | 2022-05-03 | CVE-2022-20760 | A vulnerability in the DNS inspection handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service condition (DoS) on an affected device. This vulnerability is due to a lack of proper processing of incoming requests. An attacker could exploit this vulnerability by sending crafted DNS requests at a high rate to an affected device. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a DoS condition. |
8.8 | 2022-05-03 | CVE-2022-20759 | A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, but unprivileged, remote attacker to elevate privileges to level 15. This vulnerability is due to improper separation of authentication and authorization scopes. An attacker could exploit this vulnerability by sending crafted HTTPS messages to the web services interface of an affected device. A successful exploit could allow the attacker to gain privilege level 15 access to the web management interface of the device. This includes privilege level 15 access to the device using management tools like the Cisco Adaptive Security Device Manager (ASDM) or the Cisco Security Manager (CSM). Note: With Cisco FTD Software, the impact is lower than the CVSS score suggests because the affected web management interface allows for read access only. |
7.5 | 2022-05-03 | CVE-2022-20745 | A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
7.4 | 2022-05-03 | CVE-2022-20742 | A vulnerability in an IPsec VPN library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to read or modify data within an IPsec IKEv2 VPN tunnel. This vulnerability is due to an improper implementation of Galois/Counter Mode (GCM) ciphers. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a sufficient number of encrypted messages across an affected IPsec IKEv2 VPN tunnel and then using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to decrypt, read, modify, and re-encrypt data that is transmitted across an affected IPsec IKEv2 VPN tunnel. |
7.1 | 2022-05-03 | CVE-2022-20737 | A vulnerability in the handler for HTTP authentication for resources accessed through the Clientless SSL VPN portal of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device or to obtain portions of process memory from an affected device. This vulnerability is due to insufficient bounds checking when parsing specific HTTP authentication messages. An attacker could exploit this vulnerability by sending malicious traffic to an affected device acting as a VPN Gateway. To send this malicious traffic, an attacker would need to control a web server that can be accessed through the Clientless SSL VPN portal. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition, or to retrieve bytes from the device process memory that may contain sensitive information. |
8.6 | 2022-05-03 | CVE-2022-20715 | A vulnerability in the remote access SSL VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper validation of errors that are logged as a result of client connections that are made using remote access VPN. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition. |
7.5 | 2022-04-21 | CVE-2022-20795 | A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition. This vulnerability is due to suboptimal processing that occurs when establishing a DTLS tunnel as part of an AnyConnect SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted DTLS traffic to an affected device. A successful exploit could allow the attacker to exhaust resources on the affected VPN headend device. This could cause existing DTLS tunnels to stop passing traffic and prevent new DTLS tunnels from establishing, resulting in a DoS condition. Note: When the attack traffic stops, the device recovers gracefully. |
7.5 | 2022-01-11 | CVE-2021-34704 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
7.5 | 2022-01-11 | CVE-2021-1573 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
6.5 | 2021-10-27 | CVE-2021-40125 | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device. |
7.5 | 2021-10-27 | CVE-2021-40118 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
7.5 | 2021-10-27 | CVE-2021-40117 | A vulnerability in SSL/TLS message handler for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because incoming SSL/TLS packets are not properly processed. An attacker could exploit this vulnerability by sending a crafted SSL/TLS packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. |
5.3 | 2021-10-27 | CVE-2021-34794 | A vulnerability in the Simple Network Management Protocol version 3 (SNMPv3) access control functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to query SNMP data. This vulnerability is due to ineffective access control. An attacker could exploit this vulnerability by sending an SNMPv3 query to an affected device from a host that is not permitted by the SNMPv3 access control list. A successful exploit could allow the attacker to send an SNMP query to an affected device and retrieve information from the device. The attacker would need valid credentials to perform the SNMP query. |
8.6 | 2021-10-27 | CVE-2021-34793 | A vulnerability in the TCP Normalizer of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software operating in transparent mode could allow an unauthenticated, remote attacker to poison MAC address tables, resulting in a denial of service (DoS) vulnerability. This vulnerability is due to incorrect handling of certain TCP segments when the affected device is operating in transparent mode. An attacker could exploit this vulnerability by sending a crafted TCP segment through an affected device. A successful exploit could allow the attacker to poison the MAC address tables in adjacent devices, resulting in network disruption. |
7.5 | 2021-10-27 | CVE-2021-34792 | A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
5.3 | 2021-10-27 | CVE-2021-34791 | Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming. |
5.3 | 2021-10-27 | CVE-2021-34790 | Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming. |
5.3 | 2021-10-27 | CVE-2021-34787 | A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts. |
7.5 | 2021-10-27 | CVE-2021-34783 | A vulnerability in the software-based SSL/TLS message handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient validation of SSL/TLS messages when the device performs software-based SSL/TLS decryption. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Datagram TLS (DTLS) messages cannot be used to exploit this vulnerability. |
7.5 | 2021-04-29 | CVE-2021-1504 | Multiple vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to lack of proper input validation of the HTTPS request. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. |
7.5 | 2021-04-29 | CVE-2021-1501 | A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.The vulnerability is due to a crash that occurs during a hash lookup for a SIP pinhole connection. An attacker could exploit this vulnerability by sending crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a crash and reload of the affected device. |
7.1 | 2021-04-29 | CVE-2021-1493 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a buffer overflow on an affected system. The vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a malicious HTTP request. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could disclose data fragments or cause the device to reload, resulting in a denial of service (DoS) condition. |
6.7 | 2021-04-29 | CVE-2021-1488 | A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
19% (16) | CWE-20 | Improper Input Validation |
17% (15) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
8% (7) | CWE-787 | Out-of-bounds Write |
8% (7) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
4% (4) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
4% (4) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
3% (3) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
2% (2) | CWE-755 | Improper Handling of Exceptional Conditions |
2% (2) | CWE-404 | Improper Resource Shutdown or Release |
2% (2) | CWE-203 | Information Exposure Through Discrepancy |
2% (2) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
1% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
1% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
1% (1) | CWE-704 | Incorrect Type Conversion or Cast |
1% (1) | CWE-667 | Insufficient Locking |
1% (1) | CWE-436 | Interpretation Conflict |
1% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (1) | CWE-415 | Double Free |
1% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (1) | CWE-345 | Insufficient Verification of Data Authenticity |
1% (1) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
1% (1) | CWE-295 | Certificate Issues |
1% (1) | CWE-269 | Improper Privilege Management |
1% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
1% (1) | CWE-191 | Integer Underflow (Wrap or Wraparound) |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-08 | Cisco ASA/FTD OSPF LLS denial of service attempt RuleID : 56091 - Type : SERVER-OTHER - Revision : 2 |
2020-12-08 | Cisco ASA/FTD OSPF LLS denial of service attempt RuleID : 56090 - Type : SERVER-OTHER - Revision : 1 |
2020-12-08 | Cisco ASA and FTD denial of service attempt RuleID : 56089 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-08 | Cisco ASA and FTD web services large file upload denial of service attempt RuleID : 56087 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco ASA directory traversal attempt RuleID : 54601 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco ASA directory traversal attempt RuleID : 54600 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco ASA directory traversal attempt RuleID : 54599 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco ASA directory traversal attempt RuleID : 54598 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53871 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53870 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53869 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD MGCP denial of service attempt RuleID : 53868 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco ASA and FTD IPv6 DNS request stack buffer overflow attempt RuleID : 53867 - Type : PROTOCOL-DNS - Revision : 1 |
2020-12-05 | Cisco ASA and FTD directory traversal attempt RuleID : 53851 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco ASA and FTD memory disclosure attempt RuleID : 53850 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco ASA and FTD malformed OSPF denial of service attempt RuleID : 53847 - Type : PROTOCOL-OTHER - Revision : 1 |
2020-12-05 | Cisco WebVPN cross site scripting attempt RuleID : 51729 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco WebVPN cross site scripting attempt RuleID : 51728 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco WebVPN denial of service attempt RuleID : 51713 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco ASA WebVPN expired session page direct access denial of service attempt RuleID : 50007 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Adaptive Security Appliance admin command interface access attempt RuleID : 49999 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Adaptive Security Appliance admin command interface access attempt RuleID : 49998 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco ASA secure desktop login denial of service attempt RuleID : 49996 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Adaptive Security Appliance admin REST API access attempt RuleID : 48644 - Type : POLICY-OTHER - Revision : 1 |
2019-01-15 | SIP over SCTP wildcard VIA address attempt RuleID : 48593 - Type : PROTOCOL-VOIP - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-12-21 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20181219-asa-privesc.nasl - Type: ACT_GATHER_INFO |
2018-11-08 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20181031-asaftd-sip-dos-asa.nasl - Type: ACT_GATHER_INFO |
2018-11-08 | Name: The packet inspection software installed on the remote host is affected by a ... File: cisco-sa-20181031-asaftd-sip-dos-ftd.nasl - Type: ACT_GATHER_INFO |
2018-06-25 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180606-asa.nasl - Type: ACT_GATHER_INFO |
2018-04-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180418-asa1.nasl - Type: ACT_GATHER_INFO |
2018-02-26 | Name: The remote device is missing a vendor-supplied security patch. File: cisco_asa_cve-2018-0101_dos.nasl - Type: ACT_KILL_HOST |
2018-02-06 | Name: The packet inspection software installed on the remote host is affected by a ... File: cisco-sa-20180129-asa1-ftd.nasl - Type: ACT_GATHER_INFO |
2018-01-30 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180129-asa1.nasl - Type: ACT_GATHER_INFO |
2016-09-07 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160817-asa-cli.nasl - Type: ACT_GATHER_INFO |
2016-08-25 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCva92151-asa.nasl - Type: ACT_GATHER_INFO |
2016-07-29 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160711.nasl - Type: ACT_GATHER_INFO |
2014-12-08 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CVE-2014-3407-asa.nasl - Type: ACT_GATHER_INFO |
2014-12-02 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CVE-2014-3399-asa.nasl - Type: ACT_GATHER_INFO |
2014-10-29 | Name: The remote Fedora host is missing a security update. File: fedora_2014-13030.nasl - Type: ACT_GATHER_INFO |
2014-08-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCuj83344-asa.nasl - Type: ACT_GATHER_INFO |
2014-06-11 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCun69561-asa.nasl - Type: ACT_GATHER_INFO |