A vulnerability in the Kerberos authentication feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote malicious user to impersonate the Kerberos key distribution center (KDC) and bypass authentication on an affected device that is configured to perform Kerberos authentication for VPN or local device access. The vulnerability is due to insufficient identity verification of the KDC when a successful authentication response is received. An attacker could exploit this vulnerability by spoofing the KDC server response to the ASA device. This malicious response would not have been authenticated by the KDC. A successful attack could allow an malicious user to bypass Kerberos authentication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco asa_5505_firmware 9.10\\(1.220\\) |
||
cisco asa_5510_firmware 9.10\\(1.220\\) |
||
cisco asa_5512-x_firmware 9.10\\(1.220\\) |
||
cisco asa_5515-x_firmware 9.10\\(1.220\\) |
||
cisco asa_5520_firmware 9.10\\(1.220\\) |
||
cisco asa_5525-x_firmware 9.10\\(1.220\\) |
||
cisco asa_5540_firmware 9.10\\(1.220\\) |
||
cisco asa_5545-x_firmware 9.10\\(1.220\\) |
||
cisco asa_5550_firmware 9.10\\(1.220\\) |
||
cisco asa_5555-x_firmware 9.10\\(1.220\\) |
||
cisco asa_5580_firmware 9.10\\(1.220\\) |
||
cisco asa_5585-x_firmware 9.10\\(1.220\\) |
||
cisco adaptive security appliance software |
Switchzilla issues a whopping 30+ patches in time for the long UK weekend
Cisco has emitted a fresh round of software updates to address nearly three dozen security holes in its products. The patches, released over May 6 and 7, include 12 issues considered high-severity bugs, and another 22 classified as moderate severity. One of the holes has two CVE numbers assigned to it, so that's a total of 35 CVE-listed security vulnerabilities. Despite the absence of a critical remote code or command execution bug, the patches include a number of serious programming blunders, p...