First published: Wed Aug 23 2006(Updated: )
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX | ||
Cisco PIX | ||
Cisco PIX Firewall | ||
Cisco PIX Firewall | ||
Cisco PIX | ||
Cisco PIX | ||
Cisco PIX Firewall | ||
Cisco PIX Firewall | =6.3 | |
Cisco Adaptive Security Appliance Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4312 is considered a critical vulnerability affecting Cisco PIX and ASA devices.
To mitigate CVE-2006-4312, upgrade your Cisco devices to the latest available firmware version.
CVE-2006-4312 affects various models of Cisco PIX 500 Series and ASA 5500 Series devices running specific firmware versions.
CVE-2006-4312 allows unauthorized password changes, which can compromise device management and overall network security.
There are no published workarounds for CVE-2006-4312; updating to a secure firmware version is the advised approach.