CVE-2011-2054

Severity
7.5HIGH
EPSS
0.2%
top 61.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 19
Latest updateApr 22

Description

A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages13 packages

CVEListV5cisco/cisco_asa8.4(1)

🔴Vulnerability Details

2
GHSA
GHSA-8w62-hmc9-cq72: A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondar2022-04-22
CVEList
Cisco ASA Secondary Authentication Bypass Vulnerability2020-02-19
CVE-2011-2054 (HIGH CVSS 7.5) | A vulnerability in the Cisco ASA th | cvebase.io