Product:

Adaptive_security_appliance_5540_firmware

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2017-12-15 CVE-2017-12373 A vulnerability in the TLS protocol implementation of legacy Cisco ASA 5500 Series (ASA 5505, 5510, 5520, 5540, and 5550) devices could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions. Cisco Bug IDs: CSCvg97652. Adaptive_security_appliance_5505_firmware, Adaptive_security_appliance_5510_firmware, Adaptive_security_appliance_5520_firmware, Adaptive_security_appliance_5540_firmware, Adaptive_security_appliance_5550_firmware 5.9
2018-03-05 CVE-2017-17428 Cavium Nitrox SSL, Nitrox V SSL, and TurboSSL software development kits (SDKs) allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack. Nitrox_ssl_sdk, Nitrox_v_ssl_sdk, Octeon_sdk, Octeon_ssl_sdk, Turbossl_sdk, Ace30_application_control_engine_module_firmware, Ace4710_application_control_engine_firmware, Adaptive_security_appliance_5505_firmware, Adaptive_security_appliance_5510_firmware, Adaptive_security_appliance_5520_firmware, Adaptive_security_appliance_5540_firmware, Adaptive_security_appliance_5550_firmware, Webex_conect_im, Webex_meetings 5.9