The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47, 8.3 before 8.3(2.40), 8.4 before 8.4(7.3), 8.6 before 8.6(1.13), 9.0 before 9.0(3.8), and 9.1 before 9.1(3.2) allows remote attackers to bypass authentication via (1) a crafted cookie value within modified HTTP POST data or (2) a crafted URL, aka Bug ID CSCua85555.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Adaptive_security_appliance_software | Cisco | 8.2 (including) | 8.2 (including) |
Adaptive_security_appliance_software | Cisco | 8.3(1) (including) | 8.3(1) (including) |
Adaptive_security_appliance_software | Cisco | 8.4 (including) | 8.4 (including) |
Adaptive_security_appliance_software | Cisco | 8.6 (including) | 8.6 (including) |
Adaptive_security_appliance_software | Cisco | 9.0 (including) | 9.0 (including) |
Adaptive_security_appliance_software | Cisco | 9.1 (including) | 9.1 (including) |