Lucene search

K
cve[email protected]CVE-2011-2054
HistoryFeb 19, 2020 - 3:15 a.m.

CVE-2011-2054

2020-02-1903:15:10
CWE-287
web.nvd.nist.gov
77
cisco
asa
vulnerability
remote attacker
authentication
cisco anyconnect
vpn client
ldap
input validation
nvd

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.7%

A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.

Affected configurations

NVD
Node
ciscoasa_5500_firmwareMatch8.4\(1\)
AND
ciscoasa_5500Match-
Node
ciscoasa_5510_firmwareMatch8.4\(1\)
AND
ciscoasa_5510Match-
Node
ciscoasa_5512-x_firmwareMatch8.4\(1\)
AND
ciscoasa_5512-xMatch-
Node
ciscoasa_5515-x_firmwareMatch8.4\(1\)
AND
ciscoasa_5515-xMatch-
Node
ciscoasa_5520_firmwareMatch8.4\(1\)
AND
ciscoasa_5520Match-
Node
ciscoasa_5525-x_firmwareMatch8.4\(1\)
AND
ciscoasa_5525-xMatch-
Node
ciscoasa_5540_firmwareMatch8.4\(1\)
AND
ciscoasa_5540Match-
Node
ciscoasa_5545-x_firmwareMatch8.4\(1\)
AND
ciscoasa_5545-xMatch-
Node
ciscoasa_5550_firmwareMatch8.4\(1\)
AND
ciscoasa_5550Match-
Node
ciscoasa_5555-x_firmwareMatch8.4\(1\)
AND
ciscoasa_5555-xMatch-
Node
ciscoasa_5580_firmwareMatch8.4\(1\)
AND
ciscoasa_5580Match-
Node
ciscoasa_5585-x_firmwareMatch8.4\(1\)
AND
ciscoasa_5585-xMatch-

CNA Affected

[
  {
    "product": "Cisco ASA",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "8.4(1)"
      }
    ]
  }
]

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.7%