Vulnerability identifier: #VU62670
Vulnerability risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-266
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco Adaptive Security Appliance (ASA)
Hardware solutions /
Security hardware applicances
Cisco Firepower Threat Defense (FTD)
Hardware solutions /
Security hardware applicances
Vendor:
Description
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper separation of authentication and authorization scopes in the web services interface for remote access VPN feature. A remote authenticated user can send specially crafted HTTP requests to gain privilege level 15 access to the web management interface of the device
Mitigation
Install updates from vendor's website.
Vulnerable software versions
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgmt-privesc-BMFMUvye
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz92016
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.