{"vuid":"VU#210876","idnumber":"210876","name":"Cisco PIX and ASA authentication bypass vulnerability","keywords":["Cisco","PIX","ASA","remote management access","LDAP authentication server","authentication bypass","cisco_sa_050207"],"overview":"The Cisco ASA and PIX firewalls contain an authentication bypass vulnerability. This vulnerability may allow a remote attacker to gain unauthorized access to the internal network or firewall.","clean_desc":"The Cisco Adaptive Security Appliance (ASA) is firewall that includes routing and intrusion prevention system (IPS) features. The Cisco PIX is a stateful firewall. The Cisco ASA and PIX firewalls include the ability to use LDAP and AAA servers to authenticate remote users or terminate VPN connections. Per Cisco Security Advisory cisco-sa-20070502-asa: Cisco ASA and PIX devices leveraging LDAP AAA servers for authentication of terminating L2TP IPSec tunnels or remote management sessions may be vulnerable to an authentication bypass attack. See the following bullets for more details: Layer 2 Tunneling Protocol (L2TP)\nDevices terminating L2TP IPSec tunnels must be configured to use LDAP in conjunction with CHAP, MS-CHAPv1, or MS-CHAPv2 authentication protocols to be vulnerable. If LDAP authentication is used in conjunction with PAP, the device is not vulnerable to the LDAP L2TP authentication bypass. Remote Management Access\nCisco ASA and PIX devices leveraging LDAP AAA servers for authentication of management sessions (telnet, SSH and HTTP) may be vulnerable to an authentication bypass attack. Access for management sessions must be explicitly enabled and is limited to the defined source IP address within the device configuration.","impact":"A remote, unauthenticated attacker may be able to gain access to internal resources, or gain direct access to the firewall.","resolution":"Upgrade \nCisco has released an update to address this vulnerability. See the Software Versions and Fixes section of Cisco Security Advisory cisco-sa-20070502-asa for more details.","workarounds":"Restrict access Restricting access to the firewall's telnet, SSH and HTTP interfaces to trusted hosts by using IP access control lists may mitigate this vulnerability.","sysaffected":"","thanks":"Thanks to Cisco for information that used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20070502-asa.shtml","http://www.cisco.com/en/US/products/ps6120/index.html","http://en.wikipedia.org/wiki/Intrusion-prevention_system","http://www.osvdb.org/35331"],"cveids":["CVE-2007-2462"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-02T18:34:29Z","publicdate":"2007-05-02T00:00:00Z","datefirstpublished":"2007-05-02T19:29:35Z","dateupdated":"2007-06-15T11:43:12Z","revision":11,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"7","cam_exploitation":"1","cam_internetinfrastructure":"10","cam_population":"4","cam_impact":"18","cam_easeofexploitation":"5","cam_attackeraccessrequired":"20","cam_scorecurrent":"2.43","cam_scorecurrentwidelyknown":"4.185","cam_scorecurrentwidelyknownexploited":"6.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.43,"vulnote":null}