Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-2127


Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.48), 8.3 before 8.3(2.40), 8.4 before 8.4(7.9), 8.6 before 8.6(1.13), 9.0 before 9.0(4.1), and 9.1 before 9.1(4.3) does not properly process management-session information during privilege validation for SSL VPN portal connections, which allows remote authenticated users to gain privileges by establishing a Clientless SSL VPN session and entering crafted URLs, aka Bug ID CSCul70099.


Published

2014-04-10T04:34:50.960

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 8.5 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

6.8

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco adaptive_security_appliance_software 8.0 Yes
Operating System cisco adaptive_security_appliance_software 8.1 Yes
Operating System cisco adaptive_security_appliance_software 8.2 Yes
Operating System cisco adaptive_security_appliance_software 8.3\(1\) Yes
Operating System cisco adaptive_security_appliance_software 8.4 Yes
Operating System cisco adaptive_security_appliance_software 8.6 Yes
Operating System cisco adaptive_security_appliance_software 9.0 Yes
Operating System cisco adaptive_security_appliance_software 9.1 Yes

References