Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.
References
Link | Resource |
---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | Vendor Advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70328 |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2011-10-06 10:55
Updated : 2023-08-15 14:41
NVD link : CVE-2011-3298
Mitre link : CVE-2011-3298
CVE.ORG link : CVE-2011-3298
JSON object : View
Products Affected
cisco
- catalyst_7600
- 5500_series_adaptive_security_appliance
- catalyst_6500
- firewall_services_module_software
- adaptive_security_appliance_software
- asa_5500
CWE
CWE-287
Improper Authentication