Description
The syslog-management subsystem in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to obtain an administrator password by waiting for an administrator to copy a file, and then (1) sniffing the network for a syslog message or (2) reading a syslog message in a file on a syslog server, aka Bug IDs CSCuq22357 and CSCur41860.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-3423 | The syslog-management subsystem in Cisco Adaptive Security Appliance (ASA) Software allows remote attackers to obtain an administrator password by waiting for an administrator to copy a file, and then (1) sniffing the network for a syslog message or (2) reading a syslog message in a file on a syslog server, aka Bug IDs CSCuq22357 and CSCur41860. |
References
History
No history.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-06T10:43:05.843Z
Reserved: 2014-05-07T00:00:00.000Z
Link: CVE-2014-3410
No data.
Status : Modified
Published: 2014-12-20T00:59:00.057
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-3410
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD