First published: Mon Aug 07 2017(Updated: )
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) 9.3(3) and 9.6(2) could allow an unauthenticated, remote attacker to determine valid usernames. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. An attacker could exploit the vulnerability by performing a username enumeration attack to the IP address of the device. An exploit could allow the attacker to determine valid usernames. Cisco Bug IDs: CSCvd47888.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =9.3.3 | |
Cisco Adaptive Security Appliance Software | =9.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6752 is classified as a medium severity vulnerability.
To fix CVE-2017-6752, upgrade the Cisco Adaptive Security Appliance software to a version that addresses this vulnerability.
CVE-2017-6752 can facilitate reconnaissance attacks by allowing an attacker to determine valid usernames.
CVE-2017-6752 affects Cisco Adaptive Security Appliance Software versions 9.3(3) and 9.6(2).
No, CVE-2017-6752 can be exploited by an unauthenticated remote attacker.