5.5
CVSSv2

CVE-2018-15465

Published: 24/12/2018 Updated: 09/10/2019
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Summary

A vulnerability in the authorization subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, but unprivileged (levels 0 and 1), remote malicious user to perform privileged actions by using the web management interface. The vulnerability is due to improper validation of user privileges when using the web management interface. An attacker could exploit this vulnerability by sending specific HTTP requests via HTTPS to an affected device as an unprivileged user. An exploit could allow the malicious user to retrieve files (including the running configuration) from the device or to upload and replace software images on the device.

Vulnerability Trend

Affected Products

Vendor Product Versions
CiscoAdaptive Security Appliance Software-, 7.0, 7.0(0), 7.0(1), 7.0(2), 7.0(4), 7.0(5), 7.0(5.2), 7.0(6), 7.0(6.7), 7.0(7), 7.0(8), 7.0.1, 7.0.1.4, 7.0.2, 7.0.3, 7.0.4, 7.0.4.2, 7.0.4.3, 7.0.5, 7.0.5.12, 7.0.6, 7.0.6.4, 7.0.6.8, 7.0.6.18, 7.0.6.22, 7.0.6.26, 7.0.6.29, 7.0.6.32, 7.0.7, 7.0.7.1, 7.0.7.4, 7.0.7.9, 7.0.7.12, 7.0.8, 7.0.8.2, 7.0.8.8, 7.0.8.12, 7.0.8.13, 7.1, 7.1(2), 7.1(2.5), 7.1(2.27), 7.1(2.48), 7.1(2.49), 7.1(5), 7.1.1, 7.1.2, 7.1.2.16, 7.1.2.20, 7.1.2.24, 7.1.2.28, 7.1.2.38, 7.1.2.42, 7.1.2.46, 7.1.2.49, 7.1.2.53, 7.1.2.61, 7.1.2.64, 7.1.2.72, 7.1.2.81, 7.2, 7.2(1), 7.2(1.22), 7.2(2), 7.2(2.5), 7.2(2.7), 7.2(2.8), 7.2(2.10), 7.2(2.14), 7.2(2.15), 7.2(2.16), 7.2(2.17), 7.2(2.18), 7.2(2.19), 7.2(2.48), 7.2(3), 7.2(3)6, 7.2(4), 7.2(5), 7.2.1, 7.2.1.9, 7.2.1.13, 7.2.1.19, 7.2.1.24, 7.2.2, 7.2.2.6, 7.2.2.10, 7.2.2.14, 7.2.2.18, 7.2.2.19, 7.2.2.22, 7.2.2.34, 7.2.3, 7.2.3.1, 7.2.3.12, 7.2.3.16, 7.2.4, 7.2.4.6, 7.2.4.9, 7.2.4.18, 7.2.4.25, 7.2.4.27, 7.2.4.30, 7.2.4.33, 7.2.5, 7.2.5.2, 7.2.5.4, 7.2.5.7, 7.2.5.8, 7.2.5.10, 7.2.5.12, 8.0, 8.0(2), 8.0(3), 8.0(4), 8.0(5), 8.0(5.28), 8.0(5.31), 8.0.1.2, 8.0.2, 8.0.2.11, 8.0.2.15, 8.0.3, 8.0.3.6, 8.0.3.12, 8.0.3.19, 8.0.4, 8.0.4.3, 8.0.4.9, 8.0.4.16, 8.0.4.23, 8.0.4.25, 8.0.4.28, 8.0.4.31, 8.0.4.32, 8.0.4.33, 8.0.5, 8.0.5.20, 8.0.5.23, 8.0.5.25, 8.0.5.27, 8.0.5.28, 8.0.5.31, 8.1, 8.1.0.104, 8.1.1, 8.1.1.6, 8.1.2, 8.1.2.13, 8.1.2.15, 8.1.2.16, 8.1.2.19, 8.1.2.23, 8.1.2.24, 8.1.2.49, 8.1.2.50, 8.1.2.55, 8.1.2.56, 8.2, 8.2(1), 8.2(2), 8.2(3), 8.2(3.9), 8.2(4), 8.2(4.1), 8.2(4.4), 8.2(5), 8.2(5.35), 8.2(5.38), 8.2.1, 8.2.1.11, 8.2.2, 8.2.3, 8.2.5.52, 8.2.5.55, 8.2.5.57, 8.2.5.59, 8.3(1), 8.3(2), 8.3(2.34), 8.3(2.37), 8.3.1, 8.3.2, 8.3.2.44, 8.4, 8.4(.1), 8.4(.1.3), 8.4(.1.11), 8.4(.2), 8.4(.2.1), 8.4(.2.8), 8.4(.3), 8.4(.3.8), 8.4(.3.9), 8.4(.4), 8.4(.4.1), 8.4(.4.3), 8.4(.4.5), 8.4(.4.9), 8.4(.5), 8.4(.5.6), 8.4(.6), 8.4(.7), 8.4(.7.3), 8.4(.7.15), 8.4(1), 8.4(1.11), 8.4(2), 8.4(2.11), 8.4(3), 8.4(4.11), 8.4(5), 8.4(6), 8.4.0, 8.4.1, 8.4.1.3, 8.4.1.11, 8.4.2, 8.4.2.1, 8.4.2.8, 8.4.3, 8.4.3.8, 8.4.3.9, 8.4.4, 8.4.4.1, 8.4.4.3, 8.4.4.5, 8.4.4.9, 8.4.5, 8.4.5.6, 8.4.6, 8.4.7, 8.4.7.3, 8.4.7.15, 8.4.7.22, 8.4.7.23, 8.4.7.26, 8.4.7.28, 8.4.7.29, 8.5, 8.5(1), 8.5(1.4), 8.5(1.17), 8.6, 8.6(1), 8.6(1.2), 8.6(1.3), 8.6(1.10), 8.7, 8.7(1.1), 8.7(1.3), 8.7.1, 8.7.1.1, 8.7.1.8, 8.7.1.17, 9(3), 9.0, 9.0(.1), 9.0(.2.10), 9.0(.3), 9.0(.3.6), 9.0(.3.8), 9.0(.4), 9.0(.4.1), 9.0(1), 9.0(2), 9.0(3), 9.0.3(6), 9.0.4.24, 9.0.4.26, 9.0.4.29, 9.0.4.37, 9.0.4.40, 9.0.4.42, 9.1, 9.1(.2), 9.1(.3), 9.1(.5), 9.1(1), 9.1(1.7), 9.1(2), 9.1(3), 9.1(7)4, 9.1(7)6, 9.1(7)7, 9.1(7)9, 9.1(7)11, 9.1(7)12, 9.1(7)13, 9.1(7)15, 9.1(7)16, 9.1(7)19, 9.1(7)20, 9.1(7)21, 9.1(7)23, 9.1(7)25, 9.1(7)29, 9.1.1, 9.1.4.5, 9.1.5.12, 9.1.5.21, 9.1.6, 9.1.6.8, 9.1.6.10, 9.1.7.4, 9.1.7.6, 9.1.7.7, 9.1.7.9, 9.1.7.11, 9.1.7.12, 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(4)20, 9.2(4)22, 9.2(4)24, 9.2(4)25, 9.2(4)26, 9.2(4)27, 9.2(4)28, 9.2(4)33, 9.2.2.7, 9.2.2.8, 9.2.3.3, 9.2.4, 9.2.4.2, 9.2.4.4, 9.2.4.8, 9.2.4.10, 9.2.4.13, 9.2.4.14, 9.2.4.16, 9.2.4.17, 9.2.4.18, 9.2.4.19, 9.3, 9.3(.2), 9.3(1), 9.3(1.50), 9.3(2), 9.3(2.200), 9.3(2.243), 9.3(3), 9.3.1.1, 9.3.2, 9.3.2.2, 9.3.3.5, 9.3.3.6, 9.3.3.9, 9.3.3.10, 9.3.3.11, 9.3.5, 9.4, 9.4(1), 9.4(1.1), 9.4(1.152), 9.4(1.200), 9.4(1.225), 9.4(2), 9.4(2.145), 9.4(3), 9.4(4)2, 9.4(4)5, 9.4(4)6, 9.4(4)8, 9.4(4)10, 9.4(4)12, 9.4(4)13, 9.4(4)14, 9.4(4)16, 9.4(4)17, 9.4(4)18, 9.4(4.5), 9.4.1, 9.4.1.1, 9.4.1.2, 9.4.1.3, 9.4.1.5, 9.4.2, 9.4.2.3, 9.4.3, 9.4.3.4, 9.4.3.6, 9.4.3.8, 9.4.3.11, 9.4.3.12, 9.4.4, 9.5, 9.5(1), 9.5.1, 9.5.2, 9.5.2.6, 9.5.2.10, 9.5.2.14, 9.5.3, 9.5.3.1, 9.5.3.2, 9.5.3.3, 9.5.3.6, 9.5.3.7, 9.6, 9.6(1), 9.6(2), 9.6(3)3, 9.6(3)8, 9.6(3)9, 9.6(3)11, 9.6(3)12, 9.6(3)14, 9.6(3)17, 9.6(3.1), 9.6(4), 9.6(4)3, 9.6(4)5, 9.6(4)6, 9.6(4)8, 9.6.0, 9.6.1, 9.6.1.3, 9.6.1.5, 9.6.1.10, 9.6.2, 9.6.2.1, 9.6.2.2, 9.6.2.3, 9.6.2.7, 9.7, 9.7(1), 9.7(1)1, 9.7(1)2, 9.7(1)4, 9.7(1)8, 9.7(1)15, 9.7(1)16, 9.7(1)21, 9.7(1)24, 9.7(1.4), 9.8, 9.8(0.56), 9.8(1), 9.8(1.200), 9.8(2), 9.8(2)8, 9.8(2)14, 9.8(2)17, 9.8(2)20, 9.8(2)24, 9.8(2)26, 9.8(2)28, 9.8(3), 9.9, 9.9(1), 9.9(2), 9.9(2)1, 9.10

Vendor Advisories

A vulnerability in the authorization subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, but unprivileged (levels 0 and 1), remote attacker to perform privileged actions by using the web management interface The vulnerability is due to improper validation of user privileges when using the web management inte ...