Vulnerability identifier: #VU7675
Vulnerability risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco ASA 5500-X Series
Hardware solutions /
Security hardware applicances
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.
The weakness exists in the web interface of the Cisco Adaptive Security Appliance (ASA) due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. A remote attacker can perform a username enumeration attack to the IP address of the device, determine valid usernames and conduct additional reconnaissance attacks.
Successful exploitation of the vulnerability results in information disclosure.
Mitigation
The vulnerability is addressed in the following versions: 10.0.13(0.161), 10.0.11(0.76), 10.0.8(40.131), 9.9.1(20.20), 9.9.1(10.4), 9.8.1(12.54), 9.8.1(1.114), 9.8.1(0.8), 9.7.1(0.153), 9.6.2(0.132), 9.8(0.99), 9.7(1.5), 9.6(3.2), 9.4(4.6), 9.2(4.21), 9.1(7.17).
Vulnerable software versions
Cisco ASA 5500-X Series: 9.3.3 - 9.6.2
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.