cve-2006-4312
Vulnerability from cvelistv5
Published
2006-08-23 22:00
Modified
2024-08-07 19:06
Severity ?
EPSS score ?
Summary
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:07.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-3367", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3367" }, { "name": "1016740", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016740" }, { "name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml" }, { "name": "19681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19681" }, { "name": "28143", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/28143" }, { "name": "1016738", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016738" }, { "name": "1016739", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016739" }, { "name": "cisco-pix-password-modification(28540)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540" }, { "name": "21616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21616" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-3367", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3367" }, { "name": "1016740", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016740" }, { "name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml" }, { "name": "19681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19681" }, { "name": "28143", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/28143" }, { "name": "1016738", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016738" }, { "name": "1016739", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016739" }, { "name": "cisco-pix-password-modification(28540)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540" }, { "name": "21616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21616" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-3367", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3367" }, { "name": "1016740", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016740" }, { "name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml" }, { "name": "19681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19681" }, { "name": "28143", "refsource": "OSVDB", "url": "http://www.osvdb.org/28143" }, { "name": "1016738", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016738" }, { "name": "1016739", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016739" }, { "name": "cisco-pix-password-modification(28540)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540" }, { "name": "21616", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21616" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4312", "datePublished": "2006-08-23T22:00:00", "dateReserved": "2006-08-23T00:00:00", "dateUpdated": "2024-08-07T19:06:07.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"151D5A44-2D0D-478A-B011-A0892817B814\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E346F334-9BA3-4BDC-8D0F-D749A7D76E66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6EE5C14-F556-48A5-BB3F-5465DC823B85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"286199EA-71CF-46B4-9131-F1752C2EA82D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32E437F4-1B19-4B57-9EAD-3AC04717E389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29B2019F-DF6E-4924-B0D2-37094B5265F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9600B7CF-4AEB-4319-8EF4-4FEA40EF6367\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F867890-74A4-4892-B99A-27DB4603B873\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D80DB80-F243-469B-993F-E368B092B3C5\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \\\"non-random value\\\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.\"}, {\"lang\": \"es\", \"value\": \"Cisco PIX 500 Series Security Appliances y ASA 5500 Series Adaptive Security Appliances, cuando ejecutan 7.0(x) hasta 7.0(5) y 7.1(x) hasta 7.1(2.4), y el Firewall Services Module (FWSM) 3.1(x) hasta 3.1(1.6), provoca que la contrase\\u00f1a EXEC, las contrase\\u00f1as de usuario local, y la contrase\\u00f1a de activaci\\u00f3n se cambien a un \\\"valor no aleatorio\\\" bajo determinadas circunstancias, lo que provoca un bloqueo a los administradores y podr\\u00eda permitir a los atacantes obtener acceso.\"}]", "id": "CVE-2006-4312", "lastModified": "2024-11-21T00:15:38.880", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 6.8, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.1, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2006-08-23T22:04:00.000", "references": "[{\"url\": \"http://secunia.com/advisories/21616\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016738\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016739\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016740\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.osvdb.org/28143\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/19681\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3367\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/21616\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016738\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016739\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.osvdb.org/28143\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/19681\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3367\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2006-4312\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-08-23T22:04:00.000\",\"lastModified\":\"2024-11-21T00:15:38.880\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \\\"non-random value\\\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.\"},{\"lang\":\"es\",\"value\":\"Cisco PIX 500 Series Security Appliances y ASA 5500 Series Adaptive Security Appliances, cuando ejecutan 7.0(x) hasta 7.0(5) y 7.1(x) hasta 7.1(2.4), y el Firewall Services Module (FWSM) 3.1(x) hasta 3.1(1.6), provoca que la contrase\u00f1a EXEC, las contrase\u00f1as de usuario local, y la contrase\u00f1a de activaci\u00f3n se cambien a un \\\"valor no aleatorio\\\" bajo determinadas circunstancias, lo que provoca un bloqueo a los administradores y podr\u00eda permitir a los atacantes obtener acceso.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":6.8,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.1,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151D5A44-2D0D-478A-B011-A0892817B814\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E346F334-9BA3-4BDC-8D0F-D749A7D76E66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EE5C14-F556-48A5-BB3F-5465DC823B85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286199EA-71CF-46B4-9131-F1752C2EA82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E437F4-1B19-4B57-9EAD-3AC04717E389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29B2019F-DF6E-4924-B0D2-37094B5265F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9600B7CF-4AEB-4319-8EF4-4FEA40EF6367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F867890-74A4-4892-B99A-27DB4603B873\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D80DB80-F243-469B-993F-E368B092B3C5\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/21616\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016738\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016739\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016740\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/28143\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19681\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3367\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/28143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3367\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.