CVE-2012-0335
02.05.2012, 10:09
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | adaptive_security_appliance_software | 7.2 |
cisco | adaptive_security_appliance_software | 7.2\(1\) |
cisco | adaptive_security_appliance_software | 7.2\(1.22\) |
cisco | adaptive_security_appliance_software | 7.2\(2\) |
cisco | adaptive_security_appliance_software | 7.2\(2.5\) |
cisco | adaptive_security_appliance_software | 7.2\(2.7\) |
cisco | adaptive_security_appliance_software | 7.2\(2.8\) |
cisco | adaptive_security_appliance_software | 7.2\(2.10\) |
cisco | adaptive_security_appliance_software | 7.2\(2.14\) |
cisco | adaptive_security_appliance_software | 7.2\(2.15\) |
cisco | adaptive_security_appliance_software | 7.2\(2.16\) |
cisco | adaptive_security_appliance_software | 7.2\(2.17\) |
cisco | adaptive_security_appliance_software | 7.2\(2.18\) |
cisco | adaptive_security_appliance_software | 7.2\(2.19\) |
cisco | adaptive_security_appliance_software | 7.2\(2.48\) |
cisco | adaptive_security_appliance_software | 7.2\(3\) |
cisco | adaptive_security_appliance_software | 7.2\(4\) |
cisco | adaptive_security_appliance_software | 7.2\(5\) |
cisco | adaptive_security_appliance_software | 7.2.1 |
cisco | adaptive_security_appliance_software | 7.2.2 |
cisco | adaptive_security_appliance_software | 7.2.3 |
cisco | adaptive_security_appliance_software | 7.2.4 |
cisco | adaptive_security_appliance_software | 7.2.5 |
cisco | adaptive_security_appliance_software | 8.2\(1\) |
cisco | adaptive_security_appliance_software | 8.2\(2\) |
cisco | adaptive_security_appliance_software | 8.2\(3\) |
cisco | adaptive_security_appliance_software | 8.2\(3.9\) |
cisco | adaptive_security_appliance_software | 8.2\(4\) |
cisco | adaptive_security_appliance_software | 8.2\(4.1\) |
cisco | adaptive_security_appliance_software | 8.2\(4.4\) |
cisco | adaptive_security_appliance_software | 8.2\(5\) |
cisco | adaptive_security_appliance_software | 8.2.1 |
cisco | adaptive_security_appliance_software | 8.2.2 |
cisco | adaptive_security_appliance_software | 8.2.2:interim |
cisco | adaptive_security_appliance_software | 8.2.3 |
cisco | adaptive_security_appliance_software | 8.3\(1\) |
cisco | adaptive_security_appliance_software | 8.3\(2\) |
cisco | adaptive_security_appliance_software | 8.3.1 |
cisco | adaptive_security_appliance_software | 8.3.1:interim |
cisco | adaptive_security_appliance_software | 8.3.2 |
cisco | adaptive_security_appliance_software | 8.4 |
cisco | adaptive_security_appliance_software | 8.4\(1\) |
cisco | adaptive_security_appliance_software | 8.4\(1.11\) |
cisco | adaptive_security_appliance_software | 8.4\(2\) |
cisco | adaptive_security_appliance_software | 8.4\(2.11\) |
cisco | 5500_series_adaptive_security_appliance | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References