SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Cisco ASA Vendors:   Cisco
Cisco ASA Syslog Sanitization Flaw Lets Remote Users Obtain Password Information
SecurityTracker Alert ID:  1031415
SecurityTracker URL:  http://securitytracker.com/id/1031415
CVE Reference:   CVE-2014-3410   (Links to External Site)
Date:  Dec 20 2014
Impact:   Disclosure of authentication information, Disclosure of system information
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco ASA. A remote user can obtain potentially sensitive information in certain cases.

The system does not properly sanitize syslog messages. A remote user with the ability to monitor the network when an ASA administrator copies a file to or from the ASA can obtain potentially sensitive information, including the password used by the ASA administrator.

The vendor has assigned bug IDs CSCuq22357 and CSCur41860 to this vulnerability.

Impact:   A remote user with the ability to monitor the network can obtain potentially sensitive information.
Solution:   No solution was available at the time of this entry.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC