First published: Thu Jun 25 2009(Updated: )
WebVPN on the Cisco Adaptive Security Appliances (ASA) device with software 8.0(4), 8.1.2, and 8.2.1 does not properly distinguish its own login screen from the login screens it produces for third-party (1) FTP and (2) CIFS servers, which makes it easier for remote attackers to trick a user into sending WebVPN credentials to an arbitrary server via a URL associated with that server, aka Bug ID CSCsy80709.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =8.0\(4\) | |
Cisco Adaptive Security Appliance Software | =8.1.2 | |
Cisco Adaptive Security Appliance Software | =8.2.1 | |
Cisco Adaptive Security Appliance Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1203 has a medium severity rating due to its potential to facilitate phishing attacks.
To mitigate CVE-2009-1203, it is recommended to upgrade the Cisco Adaptive Security Appliance to a version that addresses this vulnerability.
CVE-2009-1203 affects Cisco Adaptive Security Appliance software versions 8.0(4), 8.1.2, and 8.2.1.
CVE-2009-1203 enables attackers to conduct phishing attacks by tricking users into entering credentials in a spoofed login interface.
Yes, CVE-2009-1203 can be exploited remotely, making it a significant concern for organizations using affected Cisco devices.