The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of PIX

computer vulnerability bulletin CVE-2013-3458

Cisco ASA: denial of service via Certificate Processing

Synthesis of the vulnerability

An attacker can use a heavy SSL/TLS traffic load, in order to trigger a denial of service during the certificate processing of Cisco ASA.
Impacted products: ASA.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet client.
Creation date: 06/09/2013.
Identifiers: BID-62251, CSCuh19462, CVE-2013-3458, VIGILANCE-VUL-13358.

Description of the vulnerability

An attacker can use a heavy SSL/TLS traffic load, in order to trigger a denial of service during the certificate processing of Cisco ASA.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2013-3463

Cisco ASA: denial of service via Idle Timeout

Synthesis of the vulnerability

An attacker can send packets which are inspected by Cisco ASA, to generate an error in the management of the Idle Timeout, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 2/4.
Consequences: denial of service on server.
Provenance: intranet client.
Creation date: 30/08/2013.
Identifiers: CSCuh13899, CVE-2013-3463, VIGILANCE-VUL-13338.

Description of the vulnerability

An attacker can send packets which are inspected by Cisco ASA, to generate an error in the management of the Idle Timeout, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2013-3414

Cisco ASA: Cross Site Scripting of WebVPN

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting in WebVPN of Cisco ASA, in order to execute JavaScript code in the context of the web site.
Impacted products: ASA.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 25/07/2013.
Identifiers: BID-61451, CSCug83080, CVE-2013-3414, VIGILANCE-VUL-13166.

Description of the vulnerability

The Cisco ASA product offers a WebVPN portal.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting in WebVPN of Cisco ASA, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2013-3382

Cisco ASA: denial of service via NGFW

Synthesis of the vulnerability

An attacker can send unauthorized fragmented packets to a anode running Cisco ASA with the NGFW module, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 3/4.
Consequences: denial of service on server.
Provenance: internet client.
Creation date: 27/06/2013.
Identifiers: BID-60803, CERTA-2013-AVI-379, cisco-sa-20130626-ngfw, CSCue88387, CVE-2013-3382, VIGILANCE-VUL-13011.

Description of the vulnerability

The IP datagrams that are too large for Ethernet devices may be fragmented and firewalls like Cisco ASA must reassemble them.

However, when the datagrams are fragmented, forbidden by the filtering rules and destined to the firewall node, the NGFW add-on does not correctly process the fragments. An error in this case leads to node restart.

An attacker can therefore send unauthorized fragmented packets to a anode running Cisco ASA with the NGFW module, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2013-1203

Cisco ASA-CX: denial of service via TCP

Synthesis of the vulnerability

An attacker can send specially crafted TCP packets to a node running Cisco ASA-CX, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 3/4.
Consequences: denial of service on server.
Provenance: internet client.
Creation date: 18/06/2013.
Identifiers: 29683, BID-60587, CVE-2013-1203, VIGILANCE-VUL-12989.

Description of the vulnerability

An attacker can send specially crafted TCP packets to a node running Cisco ASA-CX, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2013-1215

Cisco ASA: privilege escalation via vpnclient

Synthesis of the vulnerability

A local attacker can use the vpnclient command of Cisco ASA 5505, in order to escalate his privileges.
Impacted products: ASA.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 25/04/2013.
Identifiers: BID-59262, CSCuf85295, CVE-2013-1215, VIGILANCE-VUL-12714.

Description of the vulnerability

A local attacker can use the vpnclient command of Cisco ASA 5505, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2013-1195

Cisco ASA, FWSM: bypassing ACL via time-range

Synthesis of the vulnerability

An attacker can bypass an ACL of Cisco ASA and FWSM, which uses the time-range object.
Impacted products: ASA, Cisco Catalyst, IOS by Cisco, Cisco Router.
Severity: 2/4.
Consequences: data flow.
Provenance: internet client.
Creation date: 23/04/2013.
Identifiers: BID-59395, CSCuf79091, CSCug45850, CVE-2013-1195, VIGILANCE-VUL-12705.

Description of the vulnerability

The time-range object is used to define a time range to be applied on an ACL.

However, the periodic time-range object is not correctly implemented, and it is ignored.

An attacker can therefore bypass an ACL of Cisco ASA and FWSM, which uses the time-range object.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2013-1194

Cisco ASA: enumeration of VPN groups

Synthesis of the vulnerability

An unauthenticated attacker can send ISAKMP AM1 messages to Cisco ASA, in order to detect if a VPN Group name is valid.
Impacted products: ASA.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 18/04/2013.
Identifiers: BID-59295, CSCue73708, CVE-2013-1194, TWSL2013-004, VIGILANCE-VUL-12691.

Description of the vulnerability

The Cisco ASA product can be configured as a VPN endpoint.

Clients can send an ISAKMP Aggressive Mode 1 message, which indicates the name of the VPN group. However, replies from Cisco ASA depend on whether the group exists or not.

An unauthenticated attacker can therefore send ISAKMP AM1 messages to Cisco ASA, in order to detect if a VPN Group name is valid.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2013-1199

Cisco ASA Clientless SSL VPN: denial of service via CIFS

Synthesis of the vulnerability

An attacker authenticated via Cisco ASA Clientless SSL VPN can access to several CIFS shares, to create a synchronization error, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: user account.
Creation date: 17/04/2013.
Identifiers: BID-59359, CSCub58996, CVE-2013-1199, VIGILANCE-VUL-12690.

Description of the vulnerability

An attacker authenticated via Cisco ASA Clientless SSL VPN can access to several CIFS shares, to create a synchronization error, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2013-1193

Cisco ASA, FWSM: denial of service de SSH

Synthesis of the vulnerability

An unauthenticated attacker can open a connection to OpenSSH, in order to forbid the access to legitimate users.
Impacted products: ASA, Cisco Catalyst, Cisco Router.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 12/04/2013.
Identifiers: BID-59043, CSCue63881, CSCue78671, CSCuf51892, CSCug26937, CVE-2013-1193, VIGILANCE-VUL-12668.

Description of the vulnerability

An unauthenticated attacker can open a connection to OpenSSH, in order to forbid the access to legitimate users.

This vulnerability is similar to VIGILANCE-VUL-11256.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about PIX: