Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CISCO >> CSCdx39981


Vulnerability Assessment Details

CSCdx39981

Vulnerability Assessment Summary
Uses SNMP to determine if a flaw is present

Detailed Explanation for this Vulnerability Assessment

The remote VPN concentrator is subject to a VPN client
authentication vulnerability that can force a reload of the
conectrator when a very large string for the username prompt is sent.

This vulnerability is documented as Cisco bug ID CSCdx39981

Solution :
http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml
Network Security Threat Level: Medium

*** As Nessus solely relied on the banner of the remote host
*** this might be a false positive


Networks Security ID: 5625

Vulnerability Assessment Copyright: This script is (C) 2003 Renaud Deraison

Cables, Connectors

Cisco Firepower 2110 ASA hardware firewall 2000 Mbit/s 1U
$9442.22
Cisco Firepower 2110 ASA hardware firewall 2000 Mbit/s 1U pictureCisco ASA 5525-X hardware firewall 2000 Mbit/s 1U
$8657.39
Cisco ASA 5525-X hardware firewall 2000 Mbit/s 1U pictureCisco Firepower 2110 NGFW hardware firewall 2000 Mbit/s 1U
$6202.97
Cisco Firepower 2110 NGFW hardware firewall 2000 Mbit/s 1U pictureSonicwall TZ 205 - APL22-09D Firewall Security Appliance
$10.0
Sonicwall TZ 205 - APL22-09D  Firewall Security Appliance picture


Discussions

No Discussions have been posted on this vulnerability.