CVE-2006-4312
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/08/2006
Last modified:
03/04/2025
Description
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/21616
- http://securitytracker.com/id?1016738=
- http://securitytracker.com/id?1016739=
- http://securitytracker.com/id?1016740=
- http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml
- http://www.osvdb.org/28143
- http://www.securityfocus.com/bid/19681
- http://www.vupen.com/english/advisories/2006/3367
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28540
- http://secunia.com/advisories/21616
- http://securitytracker.com/id?1016738=
- http://securitytracker.com/id?1016739=
- http://securitytracker.com/id?1016740=
- http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml
- http://www.osvdb.org/28143
- http://www.securityfocus.com/bid/19681
- http://www.vupen.com/english/advisories/2006/3367
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28540



