Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105983
Category:CISCO
Title:Cisco ASA VNMC Command Input Validation Vulnerability (cisco-sa-20141008-asa)
Summary:A vulnerability in the Virtual Network Management Center (VNMC); policy code of Cisco ASA Software could allow an authenticated, local attacker to access the; underlying Linux operating system with the privileges of the root user.
Description:Summary:
A vulnerability in the Virtual Network Management Center (VNMC)
policy code of Cisco ASA Software could allow an authenticated, local attacker to access the
underlying Linux operating system with the privileges of the root user.

Vulnerability Insight:
The vulnerability is due to insufficient sanitization of user
supplied input. An attacker could exploit this vulnerability by logging in to an affected system
as administrator, copying a malicious script onto the disk, and executing the script.

Vulnerability Impact:
An authenticated, local attacker could exploit this
vulnerability by supplying malicious input to the affected scripts. If successful, the attacker
could run arbitrary commands on the underlying operating system with the privileges of the root
user, resulting in a complete system compromise.

Affected Software/OS:
Cisco ASA version 8.7, 9.2 and 9.3.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-3390
Cisco Security Advisory: 20141008 Multiple Vulnerabilities in Cisco ASA Software
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.