First published: Fri Oct 10 2014(Updated: )
The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Virtual Appliance | ||
Cisco Adaptive Security Appliance Software | =8.2.0.45 | |
Cisco Adaptive Security Appliance Software | =8.2.1 | |
Cisco Adaptive Security Appliance Software | =8.2.1.1 | |
Cisco Adaptive Security Appliance Software | =8.2.2 | |
Cisco Adaptive Security Appliance Software | =8.2.2.10 | |
Cisco Adaptive Security Appliance Software | =8.2.2.12 | |
Cisco Adaptive Security Appliance Software | =8.2.2.16 | |
Cisco Adaptive Security Appliance Software | =8.2.2.17 | |
Cisco Adaptive Security Appliance Software | =8.2.3 | |
Cisco Adaptive Security Appliance Software | =8.2.4 | |
Cisco Adaptive Security Appliance Software | =8.2.4.1 | |
Cisco Adaptive Security Appliance Software | =8.2.4.4 | |
Cisco Adaptive Security Appliance Software | =8.2.5 | |
Cisco Adaptive Security Appliance Software | =8.2.5.13 | |
Cisco Adaptive Security Appliance Software | =8.2.5.22 | |
Cisco Adaptive Security Appliance Software | =8.2.5.26 | |
Cisco Adaptive Security Appliance Software | =8.2.5.33 | |
Cisco Adaptive Security Appliance Software | =8.2.5.40 | |
Cisco Adaptive Security Appliance Software | =8.2.5.41 | |
Cisco Adaptive Security Appliance Software | =8.2.5.46 | |
Cisco Adaptive Security Appliance Software | =8.2.5.48 | |
Cisco Adaptive Security Appliance Software | =8.4.1 | |
Cisco Adaptive Security Appliance Software | =8.4.1.3 | |
Cisco Adaptive Security Appliance Software | =8.4.1.11 | |
Cisco Adaptive Security Appliance Software | =8.4.2 | |
Cisco Adaptive Security Appliance Software | =8.4.2.1 | |
Cisco Adaptive Security Appliance Software | =8.4.2.8 | |
Cisco Adaptive Security Appliance Software | =8.4.3 | |
Cisco Adaptive Security Appliance Software | =8.4.3.8 | |
Cisco Adaptive Security Appliance Software | =8.4.3.9 | |
Cisco Adaptive Security Appliance Software | =8.4.4 | |
Cisco Adaptive Security Appliance Software | =8.4.4.1 | |
Cisco Adaptive Security Appliance Software | =8.4.4.3 | |
Cisco Adaptive Security Appliance Software | =8.4.4.5 | |
Cisco Adaptive Security Appliance Software | =8.4.4.9 | |
Cisco Adaptive Security Appliance Software | =8.4.5 | |
Cisco Adaptive Security Appliance Software | =8.4.5.6 | |
Cisco Adaptive Security Appliance Software | =8.4.6 | |
Cisco Adaptive Security Appliance Software | =8.4.7 | |
Cisco Adaptive Security Appliance Software | =8.4.7.3 | |
Cisco Adaptive Security Appliance Software | =8.6.1 | |
Cisco Adaptive Security Appliance Software | =8.6.1.1 | |
Cisco Adaptive Security Appliance Software | =8.6.1.2 | |
Cisco Adaptive Security Appliance Software | =8.6.1.5 | |
Cisco Adaptive Security Appliance Software | =8.6.1.10 | |
Cisco Adaptive Security Appliance Software | =8.6.1.12 | |
Cisco Adaptive Security Appliance Software | =8.6.1.13 | |
Cisco Adaptive Security Appliance Software | =8.7.1 | |
Cisco Adaptive Security Appliance Software | =8.7.1.3 | |
Cisco Adaptive Security Appliance Software | =8.7.1.4 | |
Cisco Adaptive Security Appliance Software | =8.7.1.7 | |
Cisco Adaptive Security Appliance Software | =8.7.1.11 | |
Cisco Adaptive Security Appliance Software | =9.0.1 | |
Cisco Adaptive Security Appliance Software | =9.0.2 | |
Cisco Adaptive Security Appliance Software | =9.0.2.10 | |
Cisco Adaptive Security Appliance Software | =9.0.3 | |
Cisco Adaptive Security Appliance Software | =9.0.3.6 | |
Cisco Adaptive Security Appliance Software | =9.0.3.8 | |
Cisco Adaptive Security Appliance Software | =9.0.4 | |
Cisco Adaptive Security Appliance Software | =9.0.4.1 | |
Cisco Adaptive Security Appliance Software | =9.0.4.5 | |
Cisco Adaptive Security Appliance Software | =9.0.4.7 | |
Cisco Adaptive Security Appliance Software | =9.1.1 | |
Cisco Adaptive Security Appliance Software | =9.1.1.4 | |
Cisco Adaptive Security Appliance Software | =9.1.2 | |
Cisco Adaptive Security Appliance Software | =9.1.2.8 | |
Cisco Adaptive Security Appliance Software | =9.1.3 | |
Cisco Adaptive Security Appliance Software | =9.1.3.2 | |
Cisco Adaptive Security Appliance Software | =9.1.4 | |
Cisco Adaptive Security Appliance Software | =9.1.5 | |
Cisco ASA 1000V Cloud Firewall | ||
Cisco ASA 5505 | ||
Cisco ASA 5512-X firmware | ||
Cisco ASA 5515-X Firmware | ||
Cisco ASA 5525-X firmware | ||
Cisco ASA 5545-X firmware | ||
Cisco ASA 5555-x firmware | ||
Cisco ASA 5580 | ||
Cisco ASA 5585-X |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3394 has a medium severity rating, allowing remote attackers to bypass certificate validation.
To fix CVE-2014-3394, upgrade to Cisco ASA Software versions 8.2(5.50), 8.4(7.15), 8.6(1.14), 8.7(1.13), 9.0(4.8), or 9.1(5.1) or later.
CVE-2014-3394 affects various versions of Cisco ASA Software prior to specified updates.
CVE-2014-3394 is classified as a certificate validation bypass vulnerability.
Yes, CVE-2014-3394 can significantly impact network security by allowing unauthorized access through certificate validation bypass.