Product:

Pix_firewall_520

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 11
Date Id Summary Products Score Patch Annotated
2005-12-22 CVE-2005-4499 The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. Adaptive_security_appliance_software, Pix_asa_ids, Pix_firewall, Pix_firewall_501, Pix_firewall_506, Pix_firewall_515, Pix_firewall_515e, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535, Pix_firewall_software, Secure_access_control_server, Vpn_3000_concentrator_series_software, Vpn_3001_concentrator, Vpn_3002_hardware_client, Vpn_3005_concentrator_software, Vpn_3015_concentrator, Vpn_3020_concentrator, Vpn_3030_concentator, Vpn_3060_concentrator, Vpn_3080_concentrator N/A
2006-07-27 CVE-2006-3906 Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected. Adaptive_security_appliance_software, Ios, Pix_asa_ids, Pix_firewall, Pix_firewall_501, Pix_firewall_506, Pix_firewall_515, Pix_firewall_515e, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535, Pix_firewall_software, Secure_pix_firewall, Vpn_3000_concentrator_series_software, Vpn_3001_concentrator, Vpn_3005_concentrator_software, Vpn_3015_concentrator, Vpn_3020_concentrator, Vpn_3030_concentator, Vpn_3060_concentrator, Vpn_3080_concentrator N/A
2010-08-09 CVE-2010-2814 Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2010-08-09 CVE-2010-2815 Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2010-08-09 CVE-2010-2816 Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2010-08-09 CVE-2010-2817 Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2011-02-25 CVE-2011-0395 Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2011-02-25 CVE-2011-0396 Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352. Adaptive_security_appliance, Adaptive_security_appliance_software, Asa_5500, Asa_5505, Asa_5510, Asa_5520, Asa_5540, Asa_5550, Asa_5580, Pix_500, Pix_501, Pix_506e, Pix_firewall_506, Pix_firewall_515, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535 N/A
2006-08-23 CVE-2006-4312 Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access. Adaptive_security_appliance, Pix_firewall_501, Pix_firewall_506, Pix_firewall_515, Pix_firewall_515e, Pix_firewall_520, Pix_firewall_525, Pix_firewall_535, Pix_firewall_software N/A
2001-06-18 CVE-2001-0375 Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote attackers to cause a denial of service via a large number of authentication requests. Pix_firewall_515, Pix_firewall_520 N/A