First published: Thu Apr 09 2009(Updated: )
Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.1(1) through 7.1(2)82, 7.2 before 7.2(4)27, 8.0 before 8.0(4)25, and 8.1 before 8.1(2)15, when AAA override-account-disable is entered in a general-attributes field, allow remote attackers to bypass authentication and establish a VPN session to an ASA device via unspecified vectors.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance 5500 | =7.1 | |
Cisco Adaptive Security Appliance 5500 | =7.2 | |
Cisco Adaptive Security Appliance 5500 | =8.0 | |
Cisco Adaptive Security Appliance 5500 | =8.1 | |
Cisco PIX Firewall | =7.1 | |
Cisco PIX Firewall | =7.2 | |
Cisco PIX Firewall | =8.0 | |
Cisco PIX Firewall | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1155 is classified as a high severity vulnerability due to its potential to allow remote attackers to bypass authentication.
To fix CVE-2009-1155, upgrade your Cisco Adaptive Security Appliance or PIX Firewall to a version that is not vulnerable, specifically after the specified fixed versions.
CVE-2009-1155 affects Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances running specific vulnerable software versions.
If affected by CVE-2009-1155, an attacker may exploit the vulnerability to gain unauthorized access by bypassing authentication mechanisms.
Yes, CVE-2009-1155 can be exploited remotely, making it critical to patch or mitigate in environments exposed to the internet.