| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Cisco ASA up to 7.x. It has been classified as problematic. The affected element is an unknown function. This manipulation causes resource management. This vulnerability is tracked as CVE-2011-2060. No exploit exists. Upgrading the affected component is recommended.
Details
A vulnerability has been found in Cisco ASA up to 7.x (Firewall Software) and classified as problematic. Affected by this vulnerability is an unknown code block. The manipulation with an unknown input leads to a resource management vulnerability. The CWE definition for the vulnerability is CWE-399. As an impact it is known to affect availability. The summary by CVE is:
The platform-sw component on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 before 8.2(5.3), 8.3 before 8.3(2.20), and 8.4 before 8.4(2.1) does not properly handle non-ASCII characters in an interface description, which allows local users to cause a denial of service (reload without configuration) via a crafted description, aka Bug ID CSCtq50523.
The weakness was disclosed 10/21/2011 with Cisco (Website). The advisory is shared at cisco.com. This vulnerability is known as CVE-2011-2060 since 05/10/2011. The exploitation appears to be easy. An attack has to be approached locally. The exploitation doesn't need any form of authentication. Neither technical details nor an exploit are publicly available.
Upgrading to version 7.2%285%29 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (71007), SecurityFocus (BID 50378†) and Vulnerability Center (SBV-36827†). The entry VDB-61486 is pretty similar. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.2VulDB Meta Temp Score: 5.9
VulDB Base Score: 6.2
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: ASA 7.2%285%29
Timeline
05/10/2011 🔍10/21/2011 🔍
10/21/2011 🔍
10/21/2011 🔍
10/26/2011 🔍
10/25/2012 🔍
03/23/2015 🔍
04/20/2017 🔍
Sources
Vendor: cisco.comAdvisory: cisco.com
Organization: Cisco
Status: Not defined
Confirmation: 🔍
CVE: CVE-2011-2060 (🔍)
GCVE (CVE): GCVE-0-2011-2060
GCVE (VulDB): GCVE-100-59197
X-Force: 71007
SecurityFocus: 50378 - Cisco Adaptive Security Appliances (ASA) 5500 'platform-sw' Local Denial of Service Vulnerability
Vulnerability Center: 36827 - Cisco ASA Local Denial of Service via a Crafted Description With non-ASCII Characters, Medium
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 04/20/2017 13:38
Changes: 03/23/2015 16:50 (57), 04/20/2017 13:38 (5)
Complete: 🔍
Cache ID: 216:F2B:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.

No comments yet. Languages: en.
Please log in to comment.