Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12373

EPSS 66.94% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-12373

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the TLS protocol implementation of legacy Cisco ASA 5500 Series (ASA 5505, 5510, 5520, 5540, and 5550) devices could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions. Cisco Bug IDs: CSCvg97652.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Cisco产品信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco ASA 5505等都是美国思科(Cisco)公司的不同型号的防火墙安全设备。 多款Cisco产品中存在信息泄露漏洞,该漏洞源于程序没有正确的执行用于阻止Bleichenbacher攻击的对策。远程攻击者可通过发送特制的TLS消息利用该漏洞访问敏感信息。以下产品受到影响:Cisco ASA 5505;Cisco ASA 5510;Cisco ASA 5520;Cisco ASA 5540;Cisco ASA 5550。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-Cisco legacy ASA 5500 products TLS protocol implementation Cisco legacy ASA 5500 products TLS protocol implementation -

II. Public POCs for CVE-2017-12373

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-12373

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-12-15 · 18 CVEs total

CVE-2017-14101Change Healthcare Conserus Image Repository archive solution 安全漏洞
CVE-2017-17701K7 Antivirus K7Sentry.sys 安全漏洞
CVE-2017-17700K7 Antivirus K7Sentry.sys 安全漏洞
CVE-2017-17699K7 Antivirus K7Sentry.sys 安全漏洞
CVE-2017-17698ZOHO ManageEngine Password Manager Pro 跨站脚本漏洞
CVE-2017-17556Synaptics TouchPad驱动程序debug tool 安全漏洞
CVE-2017-16788Meinberg LANTIME Web Configuration Utility 路径遍历漏洞
CVE-2017-16787Meinberg LANTIME Web Configuration Utility 安全漏洞
CVE-2017-16776Change Healthcare Conserus Workflow Intelligence应用程序安全漏洞
CVE-2017-17405Ruby Net::FTP 命令注入漏洞
CVE-2017-14092Trend Micro ScanMail for Exchange 跨站请求伪造漏洞
CVE-2017-17697Harbor 安全漏洞
CVE-2017-17696Techno - Portfolio Management Panel 信息泄露漏洞
CVE-2017-17695Techno - Portfolio Management Panel SQL注入漏洞
CVE-2017-17694Techno - Portfolio Management Panel 跨站脚本漏洞
CVE-2017-17693Techno - Portfolio Management Panel 安全漏洞
CVE-2017-17670VideoLAN VLC media player MP4 demux模块安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2017-12373

No comments yet


Leave a comment