102 lines
3.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2014-2126",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-10T04:34:50.930",
"lastModified": "2014-04-10T18:04:08.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496."
},
{
"lang": "es",
"value": "Cisco Adaptive Security Appliance (ASA) Software 8.2 anterior a 8.2(5.47), 8.4 anterior a 8.4(7.5), 8.7 anterior a 8.7(1.11), 9.0 anterior a 9.0(3.10) y 9.1 anterior a 9.1(3.4) permite a usuarios remotos autenticados ganar privilegios mediante el aprovechamiento de acceso ASDM a nivel-0, tambi\u00e9n conocido como Bug ID CSCuj33496."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A27A1774-01B9-43E6-86EE-B0B0426B1C81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2710F16-1DCA-4D21-BA91-04931A7EC45E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "43C420E2-D6E8-4A40-B313-3222704D85D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A436F413-6566-4A68-AD1C-3F2F2C2677E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D36DA79-34EC-4050-A20A-E4D2993731EE"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}