René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

102 lines
3.4 KiB
JSON

{
"id": "CVE-2014-2126",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-10T04:34:50.930",
"lastModified": "2014-04-10T18:04:08.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496."
},
{
"lang": "es",
"value": "Cisco Adaptive Security Appliance (ASA) Software 8.2 anterior a 8.2(5.47), 8.4 anterior a 8.4(7.5), 8.7 anterior a 8.7(1.11), 9.0 anterior a 9.0(3.10) y 9.1 anterior a 9.1(3.4) permite a usuarios remotos autenticados ganar privilegios mediante el aprovechamiento de acceso ASDM a nivel-0, tambi\u00e9n conocido como Bug ID CSCuj33496."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A27A1774-01B9-43E6-86EE-B0B0426B1C81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2710F16-1DCA-4D21-BA91-04931A7EC45E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "43C420E2-D6E8-4A40-B313-3222704D85D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A436F413-6566-4A68-AD1C-3F2F2C2677E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D36DA79-34EC-4050-A20A-E4D2993731EE"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}