Product:

Adaptive_security_appliance_software

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 311
Date Id Summary Products Score Patch Annotated
2011-01-07 CVE-2010-4692 Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.3(2) allows remote attackers to cause a denial of service (device crash) via a large number of LAN-to-LAN (aka L2L) IPsec sessions, aka Bug ID CSCth36592. 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 N/A
2011-02-25 CVE-2011-0394 Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client... 5500_series_adaptive_security_appliance, Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Firewall_services_module, Firewall_services_module_software, Pix_500 N/A
2011-02-25 CVE-2011-0395 Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2011-02-25 CVE-2011-0396 Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2012-10-29 CVE-2012-4659 The AAA functionality in the IPv4 SSL VPN implementations on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.30) and 8.3 before 8.3(2.34) allows remote attackers to cause a denial of service (device reload) via a crafted authentication response, aka Bug ID CSCtz04566. 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Catalyst_6500, Catalyst_6503\-E, Catalyst_6504\-E, Catalyst_6506\-E, Catalyst_6509\-E, Catalyst_6509\-Neb\-A, Catalyst_6509\-V\-E, Catalyst_6513, Catalyst_6513\-E N/A
2013-04-16 CVE-2013-1193 The Secure Shell (SSH) implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly terminate sessions, which allows remote attackers to cause a denial of service (SSH service outage) by repeatedly establishing SSH connections, aka Bug IDs CSCue63881, CSCuf51892, CSCue78671, and CSCug26937. Adaptive_security_appliance_software, Firewall_services_module N/A
2013-04-18 CVE-2013-1194 The ISAKMP implementation on Cisco Adaptive Security Appliances (ASA) devices generates different responses for IKE aggressive-mode messages depending on whether invalid VPN groups are specified, which allows remote attackers to enumerate groups via a series of messages, aka Bug ID CSCue73708. Adaptive_security_appliance, Adaptive_security_appliance_software N/A
2013-04-18 CVE-2013-1199 Race condition in the CIFS implementation in the rewriter module in the Clientless SSL VPN component on Cisco Adaptive Security Appliances (ASA) devices allows remote authenticated users to cause a denial of service (device reload) by accessing resources within multiple sessions, aka Bug ID CSCub58996. Adaptive_security_appliance, Adaptive_security_appliance_clientless_ssl_vpn, Adaptive_security_appliance_software N/A
2013-04-24 CVE-2013-1195 The time-based ACL implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly handle periodic statements for the time-range command, which allows remote attackers to bypass intended access restrictions by sending network traffic during denied time periods, aka Bug IDs CSCuf79091 and CSCug45850. Adaptive_security_appliance_software, Firewall_services_module N/A
2013-04-25 CVE-2013-1215 The vpnclient program in the Easy VPN component on Cisco Adaptive Security Appliances (ASA) 5505 devices allows local users to gain privileges via unspecified vectors, aka Bug ID CSCuf85295. 5500_series_adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500 N/A