Unrated severityNVD Advisory· Published Feb 19, 2020· Updated Nov 15, 2024
Cisco ASA Secondary Authentication Bypass Vulnerability
CVE-2011-2054
Description
A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.
Affected products
2- Cisco/Cisco ASAv5Range: 8.4(1)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- quickview.cloudapps.cisco.com/quickview/bug/CSCtq58884mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.