A vulnerability in the Kerberos authentication feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote malicious user to impersonate the Kerberos key distribution center (KDC) and bypass authentication on an affected device that is configured to perform Kerberos authentication for VPN or local device access. The vulnerability is due to insufficient identity verification of the KDC when a successful authentication response is received. An attacker could exploit this vulnerability by spoofing the KDC server response to the ASA device. This malicious response would not have been authenticated by the KDC. A successful attack could allow an malicious user to bypass Kerberos authentication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco asa 5505 firmware 9.10(1.220) |
||
cisco asa 5510 firmware 9.10(1.220) |
||
cisco asa 5512-x firmware 9.10(1.220) |
||
cisco asa 5515-x firmware 9.10(1.220) |
||
cisco asa 5520 firmware 9.10(1.220) |
||
cisco asa 5525-x firmware 9.10(1.220) |
||
cisco asa 5540 firmware 9.10(1.220) |
||
cisco asa 5545-x firmware 9.10(1.220) |
||
cisco asa 5550 firmware 9.10(1.220) |
||
cisco asa 5555-x firmware 9.10(1.220) |
||
cisco asa 5580 firmware 9.10(1.220) |
||
cisco asa 5585-x firmware 9.10(1.220) |
||
cisco adaptive security appliance software |
Switchzilla issues a whopping 30+ patches in time for the long UK weekend
Cisco has emitted a fresh round of software updates to address nearly three dozen security holes in its products. The patches, released over May 6 and 7, include 12 issues considered high-severity bugs, and another 22 classified as moderate severity. One of the holes has two CVE numbers assigned to it, so that's a total of 35 CVE-listed security vulnerabilities. Despite the absence of a critical remote code or command execution bug, the patches include a number of serious programming blunders, p...