CVE编号
CVE-2019-1714利用情况
暂无补丁情况
N/A披露时间
2019-05-04漏洞描述
Cisco ASA Software Release 9.7.1及之后版本和Cisco FTD Software Release 6.2.1及之后版本中的Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN)和AnyConnect Remote Access VPN的实现存在信任管理问题漏洞。该漏洞源于网络系统或产品中缺乏有效的信任管理机制。攻击者可利用默认密码或者硬编码密码、硬编码证书等攻击受影响组件。以下产品及版本受到影响:Cisco 3000 Series Industrial Security Appliances;Adaptive Security Appliance (ASA) 5500-X Series Firewalls;ASA Services Module for Cisco Catalyst 6500 Series Switches和Cisco 7600 Series Routers;Adaptive Security Virtual Appliance (ASAv);Firepower 2100 Series;Firepower 4100 Series;Firepower 9300 Security Appliances;Firepower Threat Defense Virtual。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://www.securityfocus.com/bid/108185 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.10 |
Up to (excluding) 9.10.1.17 |
||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.7 |
Up to (excluding) 9.8.4 |
||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.9 |
Up to (excluding) 9.9.2.50 |
||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * |
From (including) 6.2.1 |
Up to (excluding) 6.2.3.12 |
||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * |
From (including) 6.3.0 |
Up to (excluding) 6.3.0.3 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 无
- 可用性 无
- 保密性 无
- 完整性 高
还没有评论,来说两句吧...