First published: Thu Sep 04 2008(Updated: )
Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0(3)15, 8.0(3)16, 8.1(1)4, and 8.1(1)5, when configured as a clientless SSL VPN endpoint, allows remote attackers to obtain usernames and passwords via unknown vectors, aka Bug ID CSCsq45636.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance 5500 | =8.1 | |
Cisco Adaptive Security Appliance 5500 | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2736 has a high severity rating as it allows remote attackers to obtain sensitive usernames and passwords.
To mitigate CVE-2008-2736, update the Cisco Adaptive Security Appliance (ASA) to a patched version that is not affected by this vulnerability.
CVE-2008-2736 primarily affects Cisco Adaptive Security Appliance 5500 devices running specific versions of the software, namely 8.0(3)15, 8.0(3)16, 8.1(1)4, and 8.1(1)5.
CVE-2008-2736 allows remote attackers to exploit unspecified vectors to gain access to usernames and passwords.
There are no specific workarounds for CVE-2008-2736; upgrading to a safe version of the software is the recommended approach.