Vulnerability Details : CVE-2012-4659
The AAA functionality in the IPv4 SSL VPN implementations on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.30) and 8.3 before 8.3(2.34) allows remote attackers to cause a denial of service (device reload) via a crafted authentication response, aka Bug ID CSCtz04566.
Vulnerability category: BypassGain privilegeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-4659
Probability of exploitation activity in the next 30 days: 0.56%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 75 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4659
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
8.6
|
6.9
|
NIST |
CWE ids for CVE-2012-4659
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4659
-
http://osvdb.org/86137
-
http://www.securityfocus.com/bid/55865
Cisco ASA 5500 Series and Cisco Catalyst 6500 Series SSL VPN Denial of Service Vulnerability
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa
Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services ModuleVendor Advisory
Products affected by CVE-2012-4659
- cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(3.9\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4.1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4.4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(5\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*