8.5
CVSSv2

CVE-2014-2126

Published: 10/04/2014 Updated: 15/08/2023
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
VMScore: 880
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Cisco Adaptive Security Appliance (ASA) Software 8.2 prior to 8.2(5.47), 8.4 prior to 8.4(7.5), 8.7 prior to 8.7(1.11), 9.0 prior to 9.0(3.10), and 9.1 prior to 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco adaptive security appliance software 8.2

cisco adaptive security appliance software 8.4

cisco adaptive security appliance software 9.0

cisco adaptive security appliance software 8.7

cisco adaptive security appliance software 9.1

Vendor Advisories

Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities: Cisco ASA ASDM Privilege Escalation Vulnerability Cisco ASA SSL VPN Privilege Escalation Vulnerability Cisco ASA SSL VPN Authentication Bypass Vulnerability Cisco ASA SIP Denial of Service Vulnerability These vulnerabilities are indepen ...

Nmap Scripts

http-vuln-cve2014-2126

Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA ASDM Privilege Escalation Vulnerability (CVE-2014-2126).

nmap -p 443 --script http-vuln-cve2014-2126 <target>

PORT STATE SERVICE 443/tcp open https | http-vuln-cve2014-2126: | VULNERABLE: | Cisco ASA ASDM Privilege Escalation Vulnerability | State: VULNERABLE | Risk factor: High CVSSv2: 8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C) | Description: | Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. | | References: | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa |_ http://cvedetails.com/cve/2014-2126/
http-vuln-cve2014-2126

Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA ASDM Privilege Escalation Vulnerability (CVE-2014-2126).

nmap -p 443 --script http-vuln-cve2014-2126 <target>

PORT STATE SERVICE 443/tcp open https | http-vuln-cve2014-2126: | VULNERABLE: | Cisco ASA ASDM Privilege Escalation Vulnerability | State: VULNERABLE | Risk factor: High CVSSv2: 8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C) | Description: | Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. | | References: | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa |_ http://cvedetails.com/cve/2014-2126/

Github Repositories

Simplified Nmap Exploration

Overview This script is designed to facilitate port scanning using the Nmap command-line tool It provides an interactive interface for users to input target IP addresses or domains and additional Nmap options The script offers color-coded output for easy interpretation of results and provides the option to save the scan report in various formats It's simply provide