8.5
CVE-2014-2127
- EPSS 30.95%
- Published 10.04.2014 04:34:50
- Last modified 12.04.2025 10:46:40
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.48), 8.3 before 8.3(2.40), 8.4 before 8.4(7.9), 8.6 before 8.6(1.13), 9.0 before 9.0(4.1), and 9.1 before 9.1(4.3) does not properly process management-session information during privilege validation for SSL VPN portal connections, which allows remote authenticated users to gain privileges by establishing a Clientless SSL VPN session and entering crafted URLs, aka Bug ID CSCul70099.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Software Version8.0
Cisco ≫ Adaptive Security Appliance Software Version8.1
Cisco ≫ Adaptive Security Appliance Software Version8.2
Cisco ≫ Adaptive Security Appliance Software Version8.4
Cisco ≫ Adaptive Security Appliance Software Version8.6
Cisco ≫ Adaptive Security Appliance Software Version9.0
Cisco ≫ Adaptive Security Appliance Software Version9.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 30.95% | 0.966 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.5 | 6.8 | 10 |
AV:N/AC:M/Au:S/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.