Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105987
Category:CISCO
Title:Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability (cisco-sa-20141008-asa)
Summary:A vulnerability in the Smart Call Home (SCH) feature of Cisco; ASA Software could allow an unauthenticated, remote attacker to bypass digital certificate; validation if any feature that uses digital certificates is configured on the affected system.
Description:Summary:
A vulnerability in the Smart Call Home (SCH) feature of Cisco
ASA Software could allow an unauthenticated, remote attacker to bypass digital certificate
validation if any feature that uses digital certificates is configured on the affected system.

Vulnerability Insight:
The vulnerability exists because when SCH is configured, a
trustpoint, including a VeriSign certificate, is automatically installed. An attacker could
exploit this vulnerability by presenting a valid certificate signed by VeriSign when
authenticating to the affected system.

Vulnerability Impact:
A successful exploit could allow the attacker to gain remote
access to the inside network, which could be used to conduct further attacks.

Affected Software/OS:
Cisco ASA version 8.2, 8.4, 8.6, 8.7, 9.0 and 9.1.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-3394
Cisco Security Advisory: 20141008 Multiple Vulnerabilities in Cisco ASA Software
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.