Guest

Preview Tool

Cisco Bug: CSCvd47888 - Cisco Adaptive Security Appliance Username Enumeration Information Disclosure Vulnerability

Last Modified

May 05, 2020

Products (1)

  • Cisco ASA 5500-X Series Firewalls

Known Affected Releases

9.3(3) 9.6(2)

Description (partial)

Symptom:
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA)
could allow an unauthenticated, remote attacker to determine valid usernames. The 
attacker could use this information to conduct additional reconnaissance attacks.

The vulnerability is due to the interaction between Lightweight Directory Access 
Protocol (LDAP) and SSL Connection Profile when configured together. An attacker 
could exploit the vulnerability by doing a username enumeration attack to the ip
address of the device. An exploit could allow the attacker to determine valid usernames.

There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2

Conditions:
The device is configured with LDAP and SSL Connection Profile with ''Enable password management''.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.