Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Cisco ASA Vendors:   Cisco
Cisco ASA VPN Tunnel Group Selection Flaw Lets Remote Authenticated Users Bypass Access Controls
SecurityTracker Alert ID:  1031755
SecurityTracker URL:
CVE Reference:   CVE-2014-8023   (Links to External Site)
Date:  Feb 17 2015
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco ASA. A remote authenticated user can bypass access controls to access VPN tunnel group resources.

A remote authenticated user that authenticates to the target remote access VPN via the challenge-response mechanism can supply a specially crafted tunnel group parameter to gain access to a different tunnel group.

LDAP, RADIUS, TACACS+, and RSA-based challenge-response authentication may also be affected.

Systems configured for Clientless or AnyConnect SSL VPN are affected.

The vendor has assigned bug ID CSCtz48533 to this vulnerability.

Impact:   A remote authenticated user can access a different VPN tunnel group's resources.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC