First published: Mon Dec 24 2018(Updated: )
A vulnerability in the authorization subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, but unprivileged (levels 0 and 1), remote attacker to perform privileged actions by using the web management interface. The vulnerability is due to improper validation of user privileges when using the web management interface. An attacker could exploit this vulnerability by sending specific HTTP requests via HTTPS to an affected device as an unprivileged user. An exploit could allow the attacker to retrieve files (including the running configuration) from the device or to upload and replace software images on the device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | <9.4.4.29 | |
Cisco Adaptive Security Appliance Software | >=9.5<9.6.4.20 | |
Cisco Adaptive Security Appliance Software | >=9.7<9.8.3.18 | |
Cisco Adaptive Security Appliance Software | >=9.9<9.9.2.36 | |
Cisco Adaptive Security Appliance Software | >=9.10<9.10.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15465 is classified as a high severity vulnerability due to its potential to allow unprivileged users to perform privileged actions.
To remediate CVE-2018-15465, upgrade to the latest version of Cisco Adaptive Security Appliance (ASA) Software as provided in Cisco's security advisory.
CVE-2018-15465 affects authenticated users with unprivileged access on specific versions of Cisco Adaptive Security Appliance Software.
CVE-2018-15465 is a privilege escalation vulnerability in the authorization subsystem of Cisco ASA Software.
Yes, unprivileged users can exploit CVE-2018-15465 remotely through the web management interface.