Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21616 - | |
References | () http://securitytracker.com/id?1016738 - | |
References | () http://securitytracker.com/id?1016739 - | |
References | () http://securitytracker.com/id?1016740 - | |
References | () http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml - Vendor Advisory | |
References | () http://www.osvdb.org/28143 - | |
References | () http://www.securityfocus.com/bid/19681 - | |
References | () http://www.vupen.com/english/advisories/2006/3367 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28540 - |
Information
Published : 2006-08-23 22:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4312
Mitre link : CVE-2006-4312
CVE.ORG link : CVE-2006-4312
JSON object : View
Products Affected
cisco
- pix_firewall_515e
- pix_firewall_501
- adaptive_security_appliance
- pix_firewall_525
- pix_firewall_535
- pix_firewall_520
- pix_firewall_515
- pix_firewall_506
- pix_firewall_software
CWE