The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2014-10-10 03:55
Updated : 2023-01-24 08:09
NVD link : CVE-2014-3394
Mitre link : CVE-2014-3394
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
cisco
- adaptive_security_virtual_appliance
- adaptive_security_appliance_software
- asa_5545-x
- asa_5580
- asa_5505
- asa_1000v_cloud_firewall
- asa_5525-x
- asa_5515-x
- asa_5512-x
- asa_5585-x
- asa_5555-x