This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2020-02-19
Product Asa 5515-X Firmware Last view 2022-06-24
Version 8.4(1) Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:cisco:asa_5515-x_firmware

Activity : Overall

Related : CVE

  Date Alert Description
7.2 2022-06-24 CVE-2022-20829

A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.

7.5 2020-02-19 CVE-2011-2054

A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-345 Insufficient Verification of Data Authenticity
50% (1) CWE-287 Improper Authentication

OpenVAS Exploits

id Description
2011-08-07 Name : FreeBSD Ports: libsoup
File : nvt/freebsd_libsoup.nasl

Nessus® Vulnerability Scanner

id Description
2011-07-29 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_30cb4522b94d11e08182485d60cb5385.nasl - Type: ACT_GATHER_INFO