Lucene search

K
ciscoCiscoCISCO-SA-20150216-CVE-2014-8023
HistoryFeb 16, 2015 - 7:55 p.m.

Cisco ASA Challenge-Response Tunnel Group Selection Bypass Vulnerability

2015-02-1619:55:11
tools.cisco.com
18

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

EPSS

0.002

Percentile

53.9%

A vulnerability in the authentication code of Cisco ASA Software could allow an authenticated, remote attacker to access resources of a VPN tunnel group.

The vulnerability is due to improper implementation of the tunnel group selection when a user authenticates to the remote access VPN via the challenge-response mechanism. This vulnerability may affect Cisco ASA configured to authenticate remote access VPN users via LDAP, RADIUS, TACACS+, and RSA if a challenge-response is needed for authentication. Cisco ASA Software configured for Clientless or AnyConnect SSL VPN is affected by this vulnerability.

An attacker could exploit this vulnerability by crafting a response to the Cisco ASA with a different tunnel group parameter. A successful exploit could allow the attacker to bypass the tunnel group restriction and authenticate to a different tunnel group than the one selected during the authentication phase. This could result in accessing a different set of resources.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker must authenticate to the targeted device. This requirement would likely decrease the possibility of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoadaptive_security_appliance_softwareMatch8.2
OR
ciscoadaptive_security_appliance_softwareMatch8.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4
OR
ciscoadaptive_security_appliance_softwareMatch8.6
OR
ciscoadaptive_security_appliance_softwareMatch9.0
OR
ciscoadaptive_security_appliance_softwareMatch9.1
OR
ciscoadaptive_security_appliance_softwareMatch9.2
OR
ciscoadaptive_security_appliance_softwareMatch8.2.0.45
OR
ciscoadaptive_security_appliance_softwareMatch8.2.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.10
OR
ciscoadaptive_security_appliance_softwareMatch8.2.3
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4
OR
ciscoadaptive_security_appliance_softwareMatch8.2.1.11
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.9
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.12
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.16
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4.4
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.13
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.22
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.26
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.17
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.33
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.40
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.41
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.46
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.48
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.50
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.23
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.25
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.4
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.6
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.4
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.13
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.31
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.33
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.34
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.37
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.39
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.40
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.41
OR
ciscoadaptive_security_appliance_softwareMatch8.4.1
OR
ciscoadaptive_security_appliance_softwareMatch8.4.2
OR
ciscoadaptive_security_appliance_softwareMatch8.4.1.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4.1.11
OR
ciscoadaptive_security_appliance_softwareMatch8.4.2.8
OR
ciscoadaptive_security_appliance_softwareMatch8.4.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4.3.8
OR
ciscoadaptive_security_appliance_softwareMatch8.4.3.9
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.1
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.5
OR
ciscoadaptive_security_appliance_softwareMatch8.4.4.9
OR
ciscoadaptive_security_appliance_softwareMatch8.4.5
OR
ciscoadaptive_security_appliance_softwareMatch8.4.5.6
OR
ciscoadaptive_security_appliance_softwareMatch8.4.6
OR
ciscoadaptive_security_appliance_softwareMatch8.4.2.1
OR
ciscoadaptive_security_appliance_softwareMatch8.4.7
OR
ciscoadaptive_security_appliance_softwareMatch8.4.7.3
OR
ciscoadaptive_security_appliance_softwareMatch8.4.7.15
OR
ciscoadaptive_security_appliance_softwareMatch8.4.7.22
OR
ciscoadaptive_security_appliance_softwareMatch8.4.7.23
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.2
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.5
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.10
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.12
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.13
OR
ciscoadaptive_security_appliance_softwareMatch8.6.1.14
OR
ciscoadaptive_security_appliance_softwareMatch9.0.1
OR
ciscoadaptive_security_appliance_softwareMatch9.0.2
OR
ciscoadaptive_security_appliance_softwareMatch9.0.2.10
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3.6
OR
ciscoadaptive_security_appliance_softwareMatch9.0.3.8
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.1
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.5
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.17
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.20
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.24
OR
ciscoadaptive_security_appliance_softwareMatch9.0.4.7
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1
OR
ciscoadaptive_security_appliance_softwareMatch9.1.1.4
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2
OR
ciscoadaptive_security_appliance_softwareMatch9.1.3
OR
ciscoadaptive_security_appliance_softwareMatch9.1.2.8
OR
ciscoadaptive_security_appliance_softwareMatch9.1.3.2
OR
ciscoadaptive_security_appliance_softwareMatch9.1.4
OR
ciscoadaptive_security_appliance_softwareMatch9.1.4.5
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5.10
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5.12
OR
ciscoadaptive_security_appliance_softwareMatch9.1.5.15
OR
ciscoadaptive_security_appliance_softwareMatch9.2.1
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2.4
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2.7
OR
ciscoadaptive_security_appliance_softwareMatch9.2.3
OR
ciscoadaptive_security_appliance_softwareMatch9.2.2.8
VendorProductVersionCPE
ciscoadaptive_security_appliance_software8.2cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software8.3cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software8.4cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software8.6cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software9.0cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software9.1cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software9.2cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software8.2.0.45cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software8.2.1cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*
ciscoadaptive_security_appliance_software8.2.2cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 1071

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

EPSS

0.002

Percentile

53.9%

Related for CISCO-SA-20150216-CVE-2014-8023