Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-2054— Cisco ASA Secondary Authentication Bypass Vulnerability

CVSS 4.3 · Medium EPSS 0.17% · P38
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-2054

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco ASA Secondary Authentication Bypass Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Adaptive Security Appliances 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco ASA是美国思科(Cisco)公司的一系列应用于企业安全的防火墙。 Cisco ASA中存在安全漏洞,该漏洞源于程序没有对参数进行正确的输入验证。远程攻击者可利用该漏洞通过身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco ASA 8.4(1) -

II. Public POCs for CVE-2011-2054

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-2054

登录查看更多情报信息。

Same Patch Batch · Cisco · 2020-02-19 · 15 CVEs total

CVE-2019-19508.4 HIGHCisco IOS XE SD-WAN Software Default Credentials Vulnerability
CVE-2020-31566.1 MEDIUMCisco Identity Services Engine Cross-Site Scripting Vulnerability
CVE-2015-07494.3 MEDIUMCisco Unified Communications Manager Cross-Site Scripting Vulnerability
CVE-2020-3163Cisco Unified Contact Center Enterprise Denial of Service Vulnerability
CVE-2020-3160Cisco Meeting Server Extensible Messaging and Presence Protocol Denial of Service Vulnerab
CVE-2020-3159Cisco Finesse Web-Based Management Interface Cross-Site Scripting Vulnerability
CVE-2020-3158Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability
CVE-2020-3154Cisco Cloud Web Security SQL Injection Vulnerability
CVE-2020-3153Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability
CVE-2020-3138Cisco Enterprise NFV Infrastructure Software Remote Code Execution Vulnerability
CVE-2020-3132Cisco Email Security Appliance Shortened URL Denial of Service Vulnerability
CVE-2020-3114Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability
CVE-2020-3112Cisco Data Center Network Manager Privilege Escalation Vulnerability
CVE-2020-3113Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2011-2054

No comments yet


Leave a comment