CVE-2007-4786
Cisco Adaptive Security Appliance (ASA) running PIX 7.0 before 7.0.7.1, 7.1 before 7.1.2.61, 7.2 before 7.2.2.34, and 8.0 before 8.0.2.11, when AAA is enabled, composes %ASA-5-111008 messages from the "test aaa" command with cleartext passwords and sends them over the network to a remote syslog server or places them in a local logging buffer, which allows context-dependent attackers to obtain sensitive information.
Published
2007-09-10T21:17:00.000
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 5.3 (MEDIUM)
CVSSv2 Vector
AV:A/AC:H/Au:S/C:C/I:N/A:N
- Access Vector: ADJACENT_NETWORK
- Access Complexity: HIGH
- Authentication: SINGLE
- Confidentiality Impact: COMPLETE
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
2.5
Impact Score
6.9
Weaknesses
-
Type: Primary
CWE-319
-
Type: Secondary
CWE-319
Affected Vendors & Products
References
-
http://osvdb.org/37499
Broken Link
([email protected])
-
http://secunia.com/advisories/26677
Broken Link, Third Party Advisory
([email protected])
-
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903
Broken Link, Vendor Advisory
([email protected])
-
http://www.kb.cert.org/vuls/id/563673
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/MIMG-74ZK93
Third Party Advisory, US Government Resource
([email protected])
-
http://www.securityfocus.com/bid/25548
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id?1018660
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.vupen.com/english/advisories/2007/3076
Broken Link, Third Party Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/36473
Third Party Advisory, VDB Entry
([email protected])
-
http://osvdb.org/37499
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/26677
Broken Link, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903
Broken Link, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/563673
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/MIMG-74ZK93
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/25548
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id?1018660
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2007/3076
Broken Link, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/36473
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)