Cisco ASA SSL VPN Remote Information Disclosure (CSCuq65542)

medium Nessus Plugin ID 81574

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The Cisco ASA software on the remote device is affected by an information disclosure vulnerability in the SSL VPN feature. A remote attacker, by requesting a specific URL (/CSCOSSLC/config-auth) via HTTPS, can obtain software version information, which then can be used for reconnaissance attacks.

Solution

Apply the relevant patch referenced in Cisco bug ID CSCuq65542.

See Also

http://www.nessus.org/u?ea385c92

http://tools.cisco.com/security/center/viewAlert.x?alertId=35946

http://www.nessus.org/u?d5013fbe

Plugin Details

Severity: Medium

ID: 81574

File Name: cisco_asa_ver_info_disclosure.nbin

Version: Revision: 1.13

Type: remote

Family: CISCO

Published: 2/27/2015

Updated: 6/24/2016

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:cisco:adaptive_security_appliance_software

Required KB Items: Services/cisco-ssl-vpn-svr

Patch Publication Date: 10/3/2014

Vulnerability Publication Date: 10/3/2014

Reference Information

CVE: CVE-2014-3398

BID: 70230

OSVDB: 112670

CISCO-BUG-ID: CSCuq65542