Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.
References
Link | Resource |
---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | Vendor Advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70328 |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Information
Published : 2011-10-06 03:55
Updated : 2017-08-28 18:30
NVD link : CVE-2011-3298
Mitre link : CVE-2011-3298
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
cisco
- adaptive_security_appliance_software
- firewall_services_module_software
- 5500_series_adaptive_security_appliance
- catalyst_7600
- asa_5500
- catalyst_6500