Cisco Adaptive Security Appliance Software 9.4.4.34

CPE Details

Cisco Adaptive Security Appliance Software 9.4.4.34
9.4.4.34
2019-07-03
13h04 +00:00
2023-08-11
16h54 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4.4.34:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

adaptive_security_appliance_software

Version

9.4.4.34

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-1945 2019-08-07 21h25 +00:00 Multiple vulnerabilities in the smart tunnel functionality of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, local attacker to elevate privileges to the root user or load a malicious library file while the tunnel is being established. For more information about these vulnerabilities, see the Details section of this security advisory.
7.8
Haute
CVE-2019-1944 2019-08-07 21h20 +00:00 Multiple vulnerabilities in the smart tunnel functionality of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, local attacker to elevate privileges to the root user or load a malicious library file while the tunnel is being established. For more information about these vulnerabilities, see the Details section of this security advisory.
7.3
Haute
CVE-2019-1697 2019-05-03 15h15 +00:00 A vulnerability in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets sent to an affected device. An attacker could exploit these vulnerabilities by sending a crafted LDAP packet, using Basic Encoding Rules (BER), to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
7.5
Haute
CVE-2019-1695 2019-05-03 15h10 +00:00 A vulnerability in the detection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to send data directly to the kernel of an affected device. The vulnerability exists because the software improperly filters Ethernet frames sent to an affected device. An attacker could exploit this vulnerability by sending crafted packets to the management interface of an affected device. A successful exploit could allow the attacker to bypass the Layer 2 (L2) filters and send data directly to the kernel of the affected device. A malicious frame successfully delivered would make the target device generate a specific syslog entry.
6.5
Moyen