Cisco Adaptive Security Appliance Software vulnerabilities
306 known vulnerabilities affecting cisco/adaptive_security_appliance_software.
Total CVEs
306
CISA KEV
12
actively exploited
Public exploits
12
Exploited in wild
11
Severity breakdown
CRITICAL15HIGH177MEDIUM113LOW1
Vulnerabilities
Page 10 of 16
CVE-2015-4241MEDIUMCVSS 6.1v9.3\(2\)2015-07-08
CVE-2015-4241 [MEDIUM] CVE-2015-4241: Cisco Adaptive Security Appliance (ASA) Software 9.3(2) allows remote attackers to cause a denial of
Cisco Adaptive Security Appliance (ASA) Software 9.3(2) allows remote attackers to cause a denial of service (system reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCut52679.
nvd
CVE-2015-4239MEDIUMCVSS 6.1v100.13\(0.21\)v9.3\(2.243\)2015-07-03
CVE-2015-4239 [MEDIUM] CWE-399 CVE-2015-4239: Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.
nvd
CVE-2015-4238MEDIUMCVSS 6.8v8.4\(7\)v8.6\(1.2\)2015-07-02
CVE-2015-4238 [MEDIUM] CWE-399 CVE-2015-4238: The SNMP implementation in Cisco Adaptive Security Appliance (ASA) Software 8.4(7) and 8.6(1.2) allo
The SNMP implementation in Cisco Adaptive Security Appliance (ASA) Software 8.4(7) and 8.6(1.2) allows remote authenticated users to cause a denial of service (device reload) by sending many SNMP requests during a time of high network traffic, aka Bug ID CSCul02601.
nvd
CVE-2015-4550MEDIUMCVSS 4.3v9.3\(3\)v9.4\(1.1\)2015-06-17
CVE-2015-4550 [MEDIUM] CWE-310 CVE-2015-4550: The Cavium cryptographic-module firmware on Cisco Adaptive Security Appliance (ASA) devices with sof
The Cavium cryptographic-module firmware on Cisco Adaptive Security Appliance (ASA) devices with software 9.3(3) and 9.4(1.1) does not verify the AES-GCM Integrity Check Value (ICV) octets, which makes it easier for man-in-the-middle attackers to spoof IPSec and IKEv2 traffic by modifying packet data, aka Bug ID CSCuu66218.
nvd
CVE-2015-0760MEDIUMCVSS 4.0≥ 7.0, < 8.2.2.132015-06-04
CVE-2015-0760 [MEDIUM] CWE-20 CVE-2015-0760: The IKEv1 implementation in Cisco ASA Software 7.x, 8.0.x, 8.1.x, and 8.2.x before 8.2.2.13 allows r
The IKEv1 implementation in Cisco ASA Software 7.x, 8.0.x, 8.1.x, and 8.2.x before 8.2.2.13 allows remote authenticated users to bypass XAUTH authentication via crafted IKEv1 packets, aka Bug ID CSCus47259.
nvd
CVE-2015-0742MEDIUMCVSS 5.0v9.2\(3.4\)v9.4\(0.115\)+9 more2015-05-21
CVE-2015-0742 [MEDIUM] CWE-399 CVE-2015-0742: The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Soft
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registration, which allows remote attackers to cause a denial o
nvd
CVE-2015-0677HIGHCVSS 7.8v8.4.1v8.4.1.3+68 more2015-04-13
CVE-2015-0677 [HIGH] CWE-20 CVE-2015-0677: The XML parser in Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.28), 8.6 before
The XML parser in Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.28), 8.6 before 8.6(1.17), 9.0 before 9.0(4.33), 9.1 before 9.1(6), 9.2 before 9.2(3.4), and 9.3 before 9.3(3), when Clientless SSL VPN, AnyConnect SSL VPN, or AnyConnect IKEv2 VPN is used, allows remote attackers to cause a denial of service (VPN outage or device reload)
nvd
CVE-2015-0675HIGHCVSS 8.3v9.1.1v9.1.1.4+21 more2015-04-13
CVE-2015-0675 [HIGH] CWE-284 CVE-2015-0675: The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1
The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the
nvd
CVE-2015-0676HIGHCVSS 7.1v7.0.1v7.0.1.4+239 more2015-04-13
CVE-2015-0676 [HIGH] CWE-20 CVE-2015-0676: The DNS implementation in Cisco Adaptive Security Appliance (ASA) Software 7.2 before 7.2(5.16), 8.2
The DNS implementation in Cisco Adaptive Security Appliance (ASA) Software 7.2 before 7.2(5.16), 8.2 before 8.2(5.57), 8.3 before 8.3(2.44), 8.4 before 8.4(7.28), 8.5 before 8.5(1.24), 8.6 before 8.6(1.17), 8.7 before 8.7(1.16), 9.0 before 9.0(4.33), 9.1 before 9.1(6.1), 9.2 before 9.2(3.4), and 9.3 before 9.3(3) allows man-in-the-middle attackers to cau
nvd
CVE-2014-8023MEDIUMCVSS 4.0≤ 9.2.32015-02-17
CVE-2014-8023 [MEDIUM] CWE-264 CVE-2014-8023: Cisco Adaptive Security Appliance (ASA) Software 9.2(.3) and earlier, when challenge-response authen
Cisco Adaptive Security Appliance (ASA) Software 9.2(.3) and earlier, when challenge-response authentication is used, does not properly select tunnel groups, which allows remote authenticated users to bypass intended resource-access restrictions via a crafted tunnel-group parameter, aka Bug ID CSCtz48533.
nvd
CVE-2013-5557MEDIUMCVSS 6.3≤ 9.1\(2\)2015-02-07
CVE-2013-5557 [MEDIUM] CVE-2013-5557: The Proxy Bypass Content Rewriter feature in the WebVPN subsystem in Cisco Adaptive Security Applian
The Proxy Bypass Content Rewriter feature in the WebVPN subsystem in Cisco Adaptive Security Appliance (ASA) Software 9.1(.2) and earlier allows remote authenticated users to cause a denial of service (device crash or error-recovery event) via an HTTP request that triggers a rewrite, aka Bug ID CSCug91577.
nvd
CVE-2014-3407MEDIUMCVSS 5.0≤ 9.3\(2\)2014-11-28
CVE-2014-3407 [MEDIUM] CWE-400 CVE-2014-3407: The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier d
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.
nvd
CVE-2014-3392HIGHCVSS 8.3v8.2v8.2.0.45+103 more2014-10-10
CVE-2014-3392 [HIGH] CVE-2014-3392: The Clientless SSL VPN portal in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4
The Clientless SSL VPN portal in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.15), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows remote attackers to obtain sensitive information from process memory or modify memory contents via crafted parameters, aka Bug I
nvd
CVE-2014-3394MEDIUMCVSS 5.0v8.2.0.45v8.2.1+68 more2014-10-10
CVE-2014-3394 [MEDIUM] CWE-295 CVE-2014-3394: The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(
The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.
nvd
CVE-2014-3391MEDIUMCVSS 6.8v8.7.8v8.2.0.45+64 more2014-10-10
CVE-2014-3391 [MEDIUM] CWE-20 CVE-2014-3391: Untrusted search path vulnerability in Cisco ASA Software 8.x before 8.4(3), 8.5, and 8.7 before 8.7
Untrusted search path vulnerability in Cisco ASA Software 8.x before 8.4(3), 8.5, and 8.7 before 8.7(1.13) allows local users to gain privileges by placing a Trojan horse library file in external memory, leading to library use after device reload because of an incorrect LD_LIBRARY_PATH value, aka Bug ID CSCtq52661.
nvd
CVE-2014-3390MEDIUMCVSS 6.8v8.7.8v8.7.1+10 more2014-10-10
CVE-2014-3390 [MEDIUM] CWE-20 CVE-2014-3390: The Virtual Network Management Center (VNMC) policy implementation in Cisco ASA Software 8.7 before
The Virtual Network Management Center (VNMC) policy implementation in Cisco ASA Software 8.7 before 8.7(1.14), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows local users to obtain Linux root access by leveraging administrative privileges and executing a crafted script, aka Bug IDs CSCuq41510 and CSCuq47574.
nvd
CVE-2014-3393MEDIUMCVSS 4.3v8.2v8.2.0.45+100 more2014-10-10
CVE-2014-3393 [MEDIUM] CWE-287 CVE-2014-3393: The Clientless SSL VPN portal customization framework in Cisco ASA Software 8.2 before 8.2(5.51), 8.
The Clientless SSL VPN portal customization framework in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.14), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), and 9.2 before 9.2(2.4) does not properly implement authentication, which allows remote attackers to modify RAMFS customization objects via unspe
nvd
CVE-2014-3399MEDIUMCVSS 5.5≤ 9.2\(2.4\)2014-10-07
CVE-2014-3399 [MEDIUM] CWE-94 CVE-2014-3399: The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.2(.2.4) and earlier
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.2(.2.4) and earlier does not properly manage session information during creation of a SharePoint handler, which allows remote authenticated users to overwrite arbitrary RAMFS cache files or inject Lua programs, and consequently cause a denial of service (portal outage or s
nvd
CVE-2013-6691MEDIUMCVSS 6.8≤ 9.0\(4.1\)2014-07-14
CVE-2013-6691 [MEDIUM] CWE-119 CVE-2013-6691: The WebVPN CIFS implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0(.4.1) and ear
The WebVPN CIFS implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0(.4.1) and earlier allows remote CIFS servers to cause a denial of service (device reload) via a long share list, aka Bug ID CSCuj83344.
nvd
CVE-2013-5567MEDIUMCVSS 5.4≤ 8.4\(6\)2014-07-14
CVE-2013-5567 [MEDIUM] CWE-400 CVE-2013-5567: Cisco Adaptive Security Appliance (ASA) Software 8.4(.6) and earlier, when using an unsupported conf
Cisco Adaptive Security Appliance (ASA) Software 8.4(.6) and earlier, when using an unsupported configuration with overlapping criteria for filtering and inspection, allows remote attackers to cause a denial of service (traffic loop and device crash) via a packet that triggers multiple matches, aka Bug ID CSCui45606.
nvd