The syslog-management subsystem in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to obtain an administrator password by waiting for an administrator to copy a file, and then (1) sniffing the network for a syslog message or (2) reading a syslog message in a file on a syslog server, aka Bug IDs CSCuq22357 and CSCur41860.
                
            References
                    | Link | Resource | 
|---|---|
| http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410 | Vendor Advisory | 
| http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410 | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 02:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3410 - Vendor Advisory | 
11 Aug 2023, 18:54
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:* | 
Information
                Published : 2014-12-20 00:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-3410
Mitre link : CVE-2014-3410
CVE.ORG link : CVE-2014-3410
JSON object : View
Products Affected
                cisco
- adaptive_security_appliance_software
 
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
