Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12299

EPSS 0.23% · P45
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-12299

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability exists in the process of creating default IP blocks during device initialization for Cisco ASA Next-Generation Firewall Services that could allow an unauthenticated, remote attacker to send traffic to the local IP address of the device, bypassing any filters that are configured to deny local IP management traffic. The vulnerability is due to an implementation error that exists in the process of creating default IP blocks when the device is initialized, and the way in which those IP blocks interact with user-configured filters for local IP management traffic (for example, SSH to the device). An attacker could exploit this vulnerability by sending traffic to the local IP address of the targeted device. A successful exploit could allow the attacker to connect to the local IP address of the device even when there are filters configured to deny the traffic. Cisco Bug IDs: CSCvd97962.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco ASA Next-Generation Firewall Services 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco ASA Next-Generation Firewall Services是美国思科(Cisco)公司的一套运行在下一代防火墙产品中的模块化安全服务套件。 Cisco ASA Next-Generation Firewall Services中的创建默认IP封锁进程存在安全漏洞。在安装设备时,远程攻击者可通过向目标设备的本地IP地址发送流量利用该漏洞连接到设备的本地IP地址上。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Cisco ASA Next-Generation Firewall Services Cisco ASA Next-Generation Firewall Services -

II. Public POCs for CVE-2017-12299

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-12299

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-11-16 · 52 CVEs total

CVE-2017-16844procmail 缓冲区错误漏洞
CVE-2017-0866Google NVIDIA Tegra X1 Direct rendering infrastructur 权限许可和访问控制问题漏洞
CVE-2017-16867Amazon Key 安全漏洞
CVE-2017-14028Moxa NPort 5110、5130和5150 安全漏洞
CVE-2017-16843Vonage VDV-23 跨站脚本漏洞
CVE-2017-16719Moxa NPort 5110、5130和5150 安全漏洞
CVE-2017-16715Moxa NPort 5110、5130和5150 信息泄露漏洞
CVE-2017-16866dayrui FineCms 跨站请求伪造漏洞
CVE-2017-16847ZOHO ManageEngine Applications Manager SQL注入漏洞
CVE-2017-16846ZOHO ManageEngine Applications Manager SQL注入漏洞
CVE-2017-16848ZOHO ManageEngine Applications Manager SQL注入漏洞
CVE-2017-16777HashiCorp Vagrant VMware Fusion插件安全漏洞
CVE-2017-16560Western Digital SanDisk Secure Access 安全漏洞
CVE-2017-15864Open Ticket Request System Agent Frontend 安全漏洞
CVE-2017-12350Cisco Umbrella Insights Virtual Appliances 安全漏洞
CVE-2017-12337多款Cisco产品授权问题漏洞
CVE-2017-12323Cisco Registered Envelope Service 安全漏洞
CVE-2017-12322Cisco Registered Envelope Service 跨站脚本漏洞
CVE-2017-12321Cisco Registered Envelope Service 跨站脚本漏洞
CVE-2017-12320Cisco Registered Envelope Service 跨站脚本漏洞

Showing top 20 of 52 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-12299

No comments yet


Leave a comment