Cisco Bug: CSCvd47888 - Cisco Adaptive Security Appliance Username Enumeration Information Disclosure Vulnerability
Last Modified
May 05, 2020
Products (1)
- Cisco ASA 5500-X Series Firewalls
Known Affected Releases
9.3(3) 9.6(2)
Description (partial)
Symptom: A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to determine valid usernames. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when configured together. An attacker could exploit the vulnerability by doing a username enumeration attack to the ip address of the device. An exploit could allow the attacker to determine valid usernames. There are workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2 Conditions: The device is configured with LDAP and SSL Connection Profile with ''Enable password management''.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Status
- Severity
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases