Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-2128


The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47, 8.3 before 8.3(2.40), 8.4 before 8.4(7.3), 8.6 before 8.6(1.13), 9.0 before 9.0(3.8), and 9.1 before 9.1(3.2) allows remote attackers to bypass authentication via (1) a crafted cookie value within modified HTTP POST data or (2) a crafted URL, aka Bug ID CSCua85555.


Published

2014-04-10T04:34:51.007

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco adaptive_security_appliance_software 8.2 Yes
Operating System cisco adaptive_security_appliance_software 8.3\(1\) Yes
Operating System cisco adaptive_security_appliance_software 8.4 Yes
Operating System cisco adaptive_security_appliance_software 8.6 Yes
Operating System cisco adaptive_security_appliance_software 9.0 Yes
Operating System cisco adaptive_security_appliance_software 9.1 Yes

References