First published: Fri May 03 2019(Updated: )
A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN) and AnyConnect Remote Access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to successfully establish a VPN session to an affected device. The vulnerability is due to improper credential management when using NT LAN Manager (NTLM) or basic authentication. An attacker could exploit this vulnerability by opening a VPN session to an affected device after another VPN user has successfully authenticated to the affected device via SAML SSO. A successful exploit could allow the attacker to connect to secured networks behind the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Cisco Firepower Threat Defense | >=6.2.1<6.2.3.12 | |
Cisco Firepower Threat Defense | >=6.3.0<6.3.0.3 | |
Cisco Adaptive Security Appliance Software | >=9.7<9.8.4 | |
Cisco Adaptive Security Appliance Software | >=9.9<9.9.2.50 | |
Cisco Adaptive Security Appliance Software | >=9.10<9.10.1.17 | |
Any of | ||
Cisco Adaptive Security Virtual Appliance | ||
Cisco ASA 5506-X | ||
Cisco ASA 5506-H | ||
Cisco ASA 5506W-X | ||
Cisco ASA 5508-X | ||
Cisco ASA 5516-X | ||
Cisco ASA 5525-X | ||
Cisco ASA 5545-X | ||
Cisco ASA 5555-X | ||
Cisco Firepower 2110 | ||
Cisco Firepower 2120 | ||
Cisco Firepower 2130 | ||
Cisco Firepower 2140 | ||
Cisco Firepower 4100 Series | ||
Cisco Firepower 9300 firmware | ||
Cisco ISA 3000 Firmware | ||
Cisco Firepower Threat Defense | >=6.2.1<6.2.3.12 | |
Cisco Firepower Threat Defense | >=6.3.0<6.3.0.3 | |
Cisco Adaptive Security Appliance Software | >=9.7<9.8.4 | |
Cisco Adaptive Security Appliance Software | >=9.9<9.9.2.50 | |
Cisco Adaptive Security Appliance Software | >=9.10<9.10.1.17 | |
Cisco Adaptive Security Virtual Appliance | ||
Cisco ASA 5506-X | ||
Cisco ASA 5506-H | ||
Cisco ASA 5506W-X | ||
Cisco ASA 5508-X | ||
Cisco ASA 5516-X | ||
Cisco ASA 5525-X | ||
Cisco ASA 5545-X | ||
Cisco ASA 5555-X | ||
Cisco Firepower 2110 | ||
Cisco Firepower 2120 | ||
Cisco Firepower 2130 | ||
Cisco Firepower 2140 | ||
Cisco Firepower 4100 Series | ||
Cisco Firepower 9300 firmware | ||
Cisco ISA 3000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1714 is a vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 Single Sign-On (SSO) for Clientless SSL VPN (WebVPN) and AnyConnect Remote Access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software.
The severity of CVE-2019-1714 is high with a CVSS score of 8.6.
CVE-2019-1714 affects Cisco Adaptive Security Appliance (ASA) Software versions between 9.7 and 9.8.4, 9.9 and 9.9.2.50, and 9.10 and 9.10.1.17.
CVE-2019-1714 affects Cisco Firepower Threat Defense (FTD) Software versions between 6.2.1 and 6.2.3.12, and 6.3.0 and 6.3.0.3.
To fix CVE-2019-1714, it is recommended to update to the latest version of Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software.