The Clientless SSL VPN portal customization framework in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.14), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), and 9.2 before 9.2(2.4) does not properly implement authentication, which allows remote attackers to modify RAMFS customization objects via unspecified vectors, as demonstrated by inserting XSS sequences or capturing credentials, aka Bug ID CSCup36829.
Published 2014-10-10 10:55:07
Updated 2023-08-15 15:14:43
View at NVD,
Vulnerability category: Cross site scripting (XSS)BypassGain privilege

Exploit prediction scoring system (EPSS) score for CVE-2014-3393

Probability of exploitation activity in the next 30 days: 0.15%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 51 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2014-3393

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source

CWE ids for CVE-2014-3393

  • When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
    Assigned by: (Primary)

References for CVE-2014-3393

Products affected by CVE-2014-3393

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to terms of use!