SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Cisco ASA Vendors:   Cisco
Cisco ASA VPN Tunnel Group Selection Flaw Lets Remote Authenticated Users Bypass Access Controls
SecurityTracker Alert ID:  1031755
SecurityTracker URL:  http://securitytracker.com/id/1031755
CVE Reference:   CVE-2014-8023   (Links to External Site)
Date:  Feb 17 2015
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco ASA. A remote authenticated user can bypass access controls to access VPN tunnel group resources.

A remote authenticated user that authenticates to the target remote access VPN via the challenge-response mechanism can supply a specially crafted tunnel group parameter to gain access to a different tunnel group.

LDAP, RADIUS, TACACS+, and RSA-based challenge-response authentication may also be affected.

Systems configured for Clientless or AnyConnect SSL VPN are affected.

The vendor has assigned bug ID CSCtz48533 to this vulnerability.

Impact:   A remote authenticated user can access a different VPN tunnel group's resources.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8023

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8023 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC