First published: Tue Jun 29 2010(Updated: )
Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) complete an SSL handshake with an HTTPS client even if this client is unauthorized, which might allow remote attackers to bypass intended access restrictions via an HTTPS session, aka Bug ID CSCso10876.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA 5580 | <=8.1\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4912 has been classified as a high severity vulnerability due to its potential to allow unauthorized access to secure communications.
To fix CVE-2009-4912, update the Cisco Adaptive Security Appliance (ASA) to version 8.1(2) or later.
CVE-2009-4912 specifically affects Cisco Adaptive Security Appliance (ASA) 5580 series devices running software versions prior to 8.1(2).
Yes, CVE-2009-4912 can be exploited remotely by attackers to bypass security restrictions through unauthorized SSL handshakes.
Exploiting CVE-2009-4912 allows unauthorized HTTPS clients to establish sessions, potentially leading to unauthorized access to network resources.