cve-2014-3394
Vulnerability from cvelistv5
Published
2014-10-10 10:00
Modified
2024-08-06 10:43
Severity ?
EPSS score ?
Summary
The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:05.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141008 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-10-10T05:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20141008 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-3394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141008 Multiple Vulnerabilities in Cisco ASA Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-3394", "datePublished": "2014-10-10T10:00:00", "dateReserved": "2014-05-07T00:00:00", "dateUpdated": "2024-08-06T10:43:05.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:adaptive_security_virtual_appliance:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E785C602-BE11-4FFC-A2A7-EC520E220C0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70158003-F6CA-4A5C-893C-BF885A388D31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B9B36FF-1061-4DBD-8910-8312FF20EDB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"465313C5-BFB9-458A-8150-8F7BA1F8C386\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE7A928A-2CBA-43BC-B312-975EE9E24830\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CF721BA-25FF-485E-9102-5741AC9BC9B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F34D78E-68C9-4372-85F2-E74A1C8C06F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05748A45-8423-42F4-8F95-7BA83548C4E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C15D1F6-997D-47FD-A654-AEF3332E6105\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA3E5F50-CBD1-4516-BC97-3AF59DB39A84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62B54134-5AC7-4D7E-A7F1-D4C2057FF146\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AFE499E-09BB-4C86-AC74-7568B2D3CA51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A0B5BF7-18FB-4066-947E-7352B9951AFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B42DD43A-B6BD-4C2B-BA57-928501C62388\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDE65B75-4987-4E77-8814-F7BC9875924A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C890603E-6634-46E2-AFA9-ADE8ED1B9E41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEBAB79E-83BF-4AD1-875B-D015A18ECB82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DA41C5E-F854-4729-9498-C54FA5C00664\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B08E743-488A-4F99-ABA6-98AD534B603B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"978A0B9D-1B1D-4E22-893C-52DE75247BA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD17927A-7AFA-4177-A34E-5FEB7A9400AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"989F9AC4-C2D1-49A0-95C3-79A4EB827E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFE2E079-D7AC-4FE9-8938-A75C12AF5CA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B442C852-2465-4EA8-A977-1F10A4CE23AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6DB6ED4-3095-46C1-9CB6-2975A7B05303\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE68CD8E-B9CF-4519-8B0E-4C4488B34887\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D762C9A7-005C-44FD-9BB2-7A1DD4EBE90B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE0B1212-87F3-46E5-B14A-C0C6BBAAAC98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"518D4826-06B0-4DDC-B082-A536418FD292\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E343DE08-58FA-4C39-99F9-8CB5F57D0CD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76363698-DB62-4D92-8EE4-069891A9F92C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6159BEE3-D097-4E07-9962-06DB740E2AE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD606591-F69A-47AD-9256-20B98CA16135\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4EF3895-F372-45D3-9C7D-15F5C4712D08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DC5960D-B917-4ABA-850F-A710676ACB40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B746A138-6650-49A3-87C8-3728FE5CF215\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E50C2A13-5A8B-4FA5-ABB8-1157E560503B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"909F9D55-9276-4CF1-BC63-7CEEF8F25C21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F383D276-D5EC-4335-AC09-9D30F6443AF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39C2A7FF-6AC3-42B5-954A-9AA5950C523A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FF969BE-46BB-4AD7-85AB-8384426E9551\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8EEA7A5-67FD-4CA4-8FF8-4B17A9C47B61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94E618B3-DD03-4ECD-AB9B-97F1EDF95E79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D0DFE19-1C68-40E6-B8CD-9CC03F8B4281\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20424324-881A-496B-BC55-62AA75994249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D67012F3-5153-400E-BD6F-EB0949875F2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E40E9AB5-26E0-4BA2-9AFA-496BAA0EAC77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3BDD9D1-0DE3-4FA7-BDC1-2A724162CEEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C80EAFF-E577-414A-9DDE-D27A41CB3DC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26CC07CC-0C79-48ED-BEB6-4B576A0DBD68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1576FC7F-B7DD-41DD-A95E-23B1F86E4B02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E1C03C-0737-4E2B-B3F9-10770281F4AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7052D2-0789-4A4D-917D-FCD894B7280F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0956F0A8-7424-437C-AAD8-203183BEBFCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49FB57F9-5B37-4509-B2EB-6A16DFE11F03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"952F6504-9CD0-453E-8C25-02BB9EE818F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E842AF74-D1E3-4F71-80F9-197B38942405\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F6293A8-C21E-46F6-ACC1-6BBAD419B41F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4714F698-BBAE-47BB-99E8-F90D22415EDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB55BC7E-0B3F-4202-8768-08F27B763926\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFB01683-C482-4A5B-90FA-B5266BEA452E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA16481A-4A47-4A8E-8C78-87B3A171280A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C0258ED-6ED0-49C7-A13A-368711649FFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D448BB56-5B2E-4B3E-B7E8-1F4991F23D81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2049D602-54F1-4072-936E-0D7E337162B8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_1000v_cloud_firewall:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9182B547-0BCA-4700-8F3E-257EB5D4D4F6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08F0F160-DAD2-48D4-B7B2-4818B2526F35\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"977D597B-F6DE-4438-AB02-06BE64D71EBE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB71EB29-0115-4307-A9F7-262394FD9FB0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57179F60-E330-4FF0-9664-B1E4637FF210\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5535C936-391B-4619-AA03-B35265FC15D7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1E828B8-5ECC-4A09-B2AD-DEDC558713DE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16AE20C2-C77E-4E04-BF13-A48696E52426\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.\"}, {\"lang\": \"es\", \"value\": \"La implementaci\\u00f3n Smart Call Home (SCH) en Cisco ASA Software 8.2 anterior a 8.2(5.50), 8.4 anterior a 8.4(7.15), 8.6 anterior a 8.6(1.14), 8.7 anterior a 8.7(1.13), 9.0 anterior a 9.0(4.8), y 9.1 anterior a 9.1(5.1) permite a atacantes remotos evadir la validaci\\u00f3n de certificados a trav\\u00e9s de un certificado VeriSign arbitrario, tambi\\u00e9n conocido como Bug ID CSCun10916.\"}]", "id": "CVE-2014-3394", "lastModified": "2024-11-21T02:08:00.277", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-10-10T10:55:06.680", "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-295\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2014-3394\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2014-10-10T10:55:06.680\",\"lastModified\":\"2024-11-21T02:08:00.277\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n Smart Call Home (SCH) en Cisco ASA Software 8.2 anterior a 8.2(5.50), 8.4 anterior a 8.4(7.15), 8.6 anterior a 8.6(1.14), 8.7 anterior a 8.7(1.13), 9.0 anterior a 9.0(4.8), y 9.1 anterior a 9.1(5.1) permite a atacantes remotos evadir la validaci\u00f3n de certificados a trav\u00e9s de un certificado VeriSign arbitrario, tambi\u00e9n conocido como Bug ID CSCun10916.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:adaptive_security_virtual_appliance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E785C602-BE11-4FFC-A2A7-EC520E220C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70158003-F6CA-4A5C-893C-BF885A388D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9B36FF-1061-4DBD-8910-8312FF20EDB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE7A928A-2CBA-43BC-B312-975EE9E24830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF721BA-25FF-485E-9102-5741AC9BC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34D78E-68C9-4372-85F2-E74A1C8C06F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05748A45-8423-42F4-8F95-7BA83548C4E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C15D1F6-997D-47FD-A654-AEF3332E6105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3E5F50-CBD1-4516-BC97-3AF59DB39A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B54134-5AC7-4D7E-A7F1-D4C2057FF146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFE499E-09BB-4C86-AC74-7568B2D3CA51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0B5BF7-18FB-4066-947E-7352B9951AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42DD43A-B6BD-4C2B-BA57-928501C62388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE65B75-4987-4E77-8814-F7BC9875924A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C890603E-6634-46E2-AFA9-ADE8ED1B9E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBAB79E-83BF-4AD1-875B-D015A18ECB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA41C5E-F854-4729-9498-C54FA5C00664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B08E743-488A-4F99-ABA6-98AD534B603B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978A0B9D-1B1D-4E22-893C-52DE75247BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD17927A-7AFA-4177-A34E-5FEB7A9400AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989F9AC4-C2D1-49A0-95C3-79A4EB827E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE2E079-D7AC-4FE9-8938-A75C12AF5CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B442C852-2465-4EA8-A977-1F10A4CE23AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6DB6ED4-3095-46C1-9CB6-2975A7B05303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE68CD8E-B9CF-4519-8B0E-4C4488B34887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D762C9A7-005C-44FD-9BB2-7A1DD4EBE90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0B1212-87F3-46E5-B14A-C0C6BBAAAC98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"518D4826-06B0-4DDC-B082-A536418FD292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E343DE08-58FA-4C39-99F9-8CB5F57D0CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76363698-DB62-4D92-8EE4-069891A9F92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6159BEE3-D097-4E07-9962-06DB740E2AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD606591-F69A-47AD-9256-20B98CA16135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EF3895-F372-45D3-9C7D-15F5C4712D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC5960D-B917-4ABA-850F-A710676ACB40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B746A138-6650-49A3-87C8-3728FE5CF215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50C2A13-5A8B-4FA5-ABB8-1157E560503B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909F9D55-9276-4CF1-BC63-7CEEF8F25C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F383D276-D5EC-4335-AC09-9D30F6443AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2A7FF-6AC3-42B5-954A-9AA5950C523A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF969BE-46BB-4AD7-85AB-8384426E9551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8EEA7A5-67FD-4CA4-8FF8-4B17A9C47B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E618B3-DD03-4ECD-AB9B-97F1EDF95E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0DFE19-1C68-40E6-B8CD-9CC03F8B4281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20424324-881A-496B-BC55-62AA75994249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D67012F3-5153-400E-BD6F-EB0949875F2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E40E9AB5-26E0-4BA2-9AFA-496BAA0EAC77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3BDD9D1-0DE3-4FA7-BDC1-2A724162CEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80EAFF-E577-414A-9DDE-D27A41CB3DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CC07CC-0C79-48ED-BEB6-4B576A0DBD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576FC7F-B7DD-41DD-A95E-23B1F86E4B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E1C03C-0737-4E2B-B3F9-10770281F4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7052D2-0789-4A4D-917D-FCD894B7280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0956F0A8-7424-437C-AAD8-203183BEBFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FB57F9-5B37-4509-B2EB-6A16DFE11F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F6504-9CD0-453E-8C25-02BB9EE818F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E842AF74-D1E3-4F71-80F9-197B38942405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6293A8-C21E-46F6-ACC1-6BBAD419B41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714F698-BBAE-47BB-99E8-F90D22415EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB55BC7E-0B3F-4202-8768-08F27B763926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB01683-C482-4A5B-90FA-B5266BEA452E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA16481A-4A47-4A8E-8C78-87B3A171280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0258ED-6ED0-49C7-A13A-368711649FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448BB56-5B2E-4B3E-B7E8-1F4991F23D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2049D602-54F1-4072-936E-0D7E337162B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_1000v_cloud_firewall:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9182B547-0BCA-4700-8F3E-257EB5D4D4F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F0F160-DAD2-48D4-B7B2-4818B2526F35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"977D597B-F6DE-4438-AB02-06BE64D71EBE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB71EB29-0115-4307-A9F7-262394FD9FB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57179F60-E330-4FF0-9664-B1E4637FF210\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5535C936-391B-4619-AA03-B35265FC15D7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1E828B8-5ECC-4A09-B2AD-DEDC558713DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16AE20C2-C77E-4E04-BF13-A48696E52426\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.