Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Adaptive_security_appliance
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 64 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-05-06 | CVE-2020-3306 | A vulnerability in the DHCP module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to incorrect processing of certain DHCP packets. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the affected device. A successful exploit could allow the attacker to cause a DoS... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_threat_defense | 7.5 | ||
2020-09-23 | CVE-2019-15992 | A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_management_center, Firepower_threat_defense | 7.2 | ||
2020-10-21 | CVE-2020-3304 | A vulnerability in the web interface of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_threat_defense | 8.6 | ||
2020-10-21 | CVE-2020-3436 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to upload arbitrary-sized files to specific folders on an affected device, which could lead to an unexpected device reload. The vulnerability exists because the affected software does not efficiently handle the writing of large files to specific folders on the local file system. An attacker could exploit... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_threat_defense | 8.6 | ||
2020-10-21 | CVE-2020-3554 | A vulnerability in the TCP packet processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory exhaustion condition. An attacker could exploit this vulnerability by sending a high rate of crafted TCP traffic through an affected device. A successful exploit could allow the attacker to... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_threat_defense | 7.5 | ||
2020-10-21 | CVE-2020-3561 | A vulnerability in the Clientless SSL VPN (WebVPN) of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to inject arbitrary HTTP headers in the responses of the affected system. The vulnerability is due to improper input sanitization. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to conduct... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_threat_defense | 4.7 | ||
2020-10-21 | CVE-2020-3564 | A vulnerability in the FTP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass FTP inspection. The vulnerability is due to ineffective flow tracking of FTP traffic. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and successfully complete FTP... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_threat_defense | 5.3 | ||
2022-01-11 | CVE-2021-1573 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the... | Adaptive_security_appliance, Adaptive_security_appliance_software, Firepower_threat_defense | 7.5 | ||
2013-01-18 | CVE-2012-5717 | Cisco Adaptive Security Appliances (ASA) devices with firmware 8.x through 8.4(1) do not properly manage SSH sessions, which allows remote authenticated users to cause a denial of service (device crash) by establishing multiple sessions, aka Bug ID CSCtc59462. | Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_1000v_cloud_firewall, Asa_5500 | N/A | ||
2013-01-18 | CVE-2012-6395 | Cisco Adaptive Security Appliances (ASA) devices with firmware 8.4 do not properly validate unspecified input related to UNC share pathnames, which allows remote authenticated users to cause a denial of service (device crash) via unknown vectors, aka Bug ID CSCuc65775. | Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_1000v_cloud_firewall, Asa_5500 | N/A |