CVE-2006-4312 (GCVE-0-2006-4312)
Vulnerability from cvelistv5 – Published: 2006-08-23 22:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:06:07.253Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-3367",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21616"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-3367",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21616"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4312",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-3367",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21616"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4312",
"datePublished": "2006-08-23T22:00:00",
"dateReserved": "2006-08-23T00:00:00",
"dateUpdated": "2024-08-07T19:06:07.253Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"151D5A44-2D0D-478A-B011-A0892817B814\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E346F334-9BA3-4BDC-8D0F-D749A7D76E66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6EE5C14-F556-48A5-BB3F-5465DC823B85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"286199EA-71CF-46B4-9131-F1752C2EA82D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32E437F4-1B19-4B57-9EAD-3AC04717E389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29B2019F-DF6E-4924-B0D2-37094B5265F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9600B7CF-4AEB-4319-8EF4-4FEA40EF6367\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F867890-74A4-4892-B99A-27DB4603B873\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D80DB80-F243-469B-993F-E368B092B3C5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \\\"non-random value\\\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.\"}, {\"lang\": \"es\", \"value\": \"Cisco PIX 500 Series Security Appliances y ASA 5500 Series Adaptive Security Appliances, cuando ejecutan 7.0(x) hasta 7.0(5) y 7.1(x) hasta 7.1(2.4), y el Firewall Services Module (FWSM) 3.1(x) hasta 3.1(1.6), provoca que la contrase\\u00f1a EXEC, las contrase\\u00f1as de usuario local, y la contrase\\u00f1a de activaci\\u00f3n se cambien a un \\\"valor no aleatorio\\\" bajo determinadas circunstancias, lo que provoca un bloqueo a los administradores y podr\\u00eda permitir a los atacantes obtener acceso.\"}]",
"id": "CVE-2006-4312",
"lastModified": "2024-11-21T00:15:38.880",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 6.8, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.1, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2006-08-23T22:04:00.000",
"references": "[{\"url\": \"http://secunia.com/advisories/21616\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016738\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016739\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016740\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.osvdb.org/28143\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/19681\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3367\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/21616\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016738\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016739\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.osvdb.org/28143\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/19681\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3367\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2006-4312\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-08-23T22:04:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \\\"non-random value\\\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.\"},{\"lang\":\"es\",\"value\":\"Cisco PIX 500 Series Security Appliances y ASA 5500 Series Adaptive Security Appliances, cuando ejecutan 7.0(x) hasta 7.0(5) y 7.1(x) hasta 7.1(2.4), y el Firewall Services Module (FWSM) 3.1(x) hasta 3.1(1.6), provoca que la contrase\u00f1a EXEC, las contrase\u00f1as de usuario local, y la contrase\u00f1a de activaci\u00f3n se cambien a un \\\"valor no aleatorio\\\" bajo determinadas circunstancias, lo que provoca un bloqueo a los administradores y podr\u00eda permitir a los atacantes obtener acceso.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":6.8,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.1,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151D5A44-2D0D-478A-B011-A0892817B814\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E346F334-9BA3-4BDC-8D0F-D749A7D76E66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EE5C14-F556-48A5-BB3F-5465DC823B85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286199EA-71CF-46B4-9131-F1752C2EA82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E437F4-1B19-4B57-9EAD-3AC04717E389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29B2019F-DF6E-4924-B0D2-37094B5265F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9600B7CF-4AEB-4319-8EF4-4FEA40EF6367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F867890-74A4-4892-B99A-27DB4603B873\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D80DB80-F243-469B-993F-E368B092B3C5\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/21616\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016738\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016739\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016740\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/28143\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19681\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3367\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/28143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3367\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…