CVE-2019-1714 (CNNVD-201905-038)

MEDIUM
中文标题:
多款Cisco产品安全漏洞
英文标题:
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN SAML Authentication Bypass Vulnerability
CVSS分数: 5.8
发布时间: 2019-05-03 16:15:18
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliances Software(ASA Software)都是美国思科(Cisco)公司的产品。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。Cisco Adaptive Security Appliances Software是一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco ASA Software Release 9.7.1及之后版本和Cisco FTD Software Release 6.2.1及之后版本中的Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN)和AnyConnect Remote Access VPN的实现存在安全漏洞。该漏洞源于网络系统或产品中缺乏有效的信任管理机制。攻击者可利用默认密码或者硬编码密码、硬编码证书等攻击受影响组件。以下产品及版本受到影响:Cisco 3000 Series Industrial Security Appliances;Adaptive Security Appliance (ASA) 5500-X Series Firewalls;ASA Services Module for Cisco Catalyst 6500 Series Switches和Cisco 7600 Series Routers;Adaptive Security Virtual Appliance (ASAv);Firepower 2100 Series;Firepower 4100 Series;Firepower 9300 Security Appliances;Firepower Threat Defense Virtual。

英文描述:

A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN) and AnyConnect Remote Access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to successfully establish a VPN session to an affected device. The vulnerability is due to improper credential management when using NT LAN Manager (NTLM) or basic authentication. An attacker could exploit this vulnerability by opening a VPN session to an affected device after another VPN user has successfully authenticated to the affected device via SAML SSO. A successful exploit could allow the attacker to connect to secured networks behind the affected device.

CWE类型:
CWE-255
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Cisco Cisco Adaptive Security Appliance (ASA) Software - < 9.8.4 - cpe:2.3:a:cisco:cisco_adaptive_security_appliance_(asa)_software:*:*:*:*:*:*:*:*
Cisco Cisco Firepower Threat Defense (FTD) Software - < 6.2.3.12 - cpe:2.3:a:cisco:cisco_firepower_threat_defense_(ftd)_software:*:*:*:*:*:*:*:*
cisco firepower_threat_defense * - - cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software * - - cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20190501 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN SAML Authentication Bypass Vulnerability vendor-advisory
cve.org
访问
108185 vdb-entry
cve.org
访问
CVSS评分详情
3.0 (cna)
MEDIUM
5.8
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
机密性
NONE
完整性
LOW
可用性
NONE
时间信息
发布时间:
2019-05-03 16:15:18
修改时间:
2024-11-19 19:08:27
创建时间:
2025-11-11 15:35:38
更新时间:
2025-11-11 15:54:29
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2019-1714 2025-11-11 15:20:08 2025-11-11 07:35:38
NVD nvd_CVE-2019-1714 2025-11-11 14:56:22 2025-11-11 07:44:09
CNNVD cnnvd_CNNVD-201905-038 2025-11-11 15:10:12 2025-11-11 07:54:29
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:54:29
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-201905-038; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-201905-038
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:09
affected_products_count: 5 → 4; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 5 -> 4
  • data_sources: ['cve'] -> ['cve', 'nvd']