The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2014-10-10 10:55
Updated : 2023-08-15 14:52
NVD link : CVE-2014-3394
Mitre link : CVE-2014-3394
CVE.ORG link : CVE-2014-3394
JSON object : View
Products Affected
cisco
- asa_5555-x
- asa_5512-x
- asa_5525-x
- asa_5585-x
- asa_5580
- adaptive_security_virtual_appliance
- asa_5505
- adaptive_security_appliance_software
- asa_5545-x
- asa_1000v_cloud_firewall
- asa_5515-x
CWE
CWE-295
Improper Certificate Validation