SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Cisco ASA Vendors:   Cisco
Cisco ASA MAC Validation Flaw Lets Remote Users Modify TLS Encrypted Data
SecurityTracker Alert ID:  1032927
SecurityTracker URL:  http://securitytracker.com/id/1032927
CVE Reference:   CVE-2015-4458   (Links to External Site)
Updated:  Jul 20 2015
Original Entry Date:  Jul 15 2015
Impact:   Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.1(5.21)
Description:   A vulnerability was reported in Cisco ASA. A remote user can bypass security controls to modify data sent to the target system.

The Cavium Networks cryptographic module firmware does not properly validate the message authentication code (MAC) on TLS encrypted data sent to the device. A remote user can that can conduct a man-in-the-middle attack can modify encrypted Transport Layer Security (TLS) data without detection.

The vendor has assigned bug ID CSCuu52976 to this vulnerability.

Mr. Yngve Pettersen from TLS Prober Labs reported this vulnerability.

Impact:   A remote user can bypass security controls to modify data sent to the target system.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/viewAlert.x?alertId=39919

Vendor URL:  tools.cisco.com/security/center/viewAlert.x?alertId=39919 (Links to External Site)
Cause:   Authentication error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC