CVE-2020-3125
Summary
| CVE | CVE-2020-3125 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-06 17:15:00 UTC |
| Updated | 2023-08-16 16:17:00 UTC |
| Description | A vulnerability in the Kerberos authentication feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to impersonate the Kerberos key distribution center (KDC) and bypass authentication on an affected device that is configured to perform Kerberos authentication for VPN or local device access. The vulnerability is due to insufficient identity verification of the KDC when a successful authentication response is received. An attacker could exploit this vulnerability by spoofing the KDC server response to the ASA device. This malicious response would not have been authenticated by the KDC. A successful attack could allow an attacker to bypass Kerberos authentication. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Adaptive Security Appliance | All | All | All | All |
| Application | Cisco | Adaptive Security Appliance | All | All | All | All |
| Operating System | Cisco | Adaptive Security Appliance Software | All | All | All | All |
| Hardware | Cisco | Asa 5505 | - | All | All | All |
| Hardware | Cisco | Asa 5505 | - | All | All | All |
| Operating System | Cisco | Asa 5505 Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5505 Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5510 | - | All | All | All |
| Hardware | Cisco | Asa 5510 | - | All | All | All |
| Operating System | Cisco | Asa 5510 Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5510 Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5512-x | - | All | All | All |
| Hardware | Cisco | Asa 5512-x | - | All | All | All |
| Operating System | Cisco | Asa 5512-x Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5512-x Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5515-x | - | All | All | All |
| Hardware | Cisco | Asa 5515-x | - | All | All | All |
| Operating System | Cisco | Asa 5515-x Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5515-x Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5520 | - | All | All | All |
| Hardware | Cisco | Asa 5520 | - | All | All | All |
| Operating System | Cisco | Asa 5520 Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5520 Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5525-x | - | All | All | All |
| Hardware | Cisco | Asa 5525-x | - | All | All | All |
| Operating System | Cisco | Asa 5525-x Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5525-x Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5540 | - | All | All | All |
| Hardware | Cisco | Asa 5540 | - | All | All | All |
| Operating System | Cisco | Asa 5540 Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5540 Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5545-x | - | All | All | All |
| Hardware | Cisco | Asa 5545-x | - | All | All | All |
| Operating System | Cisco | Asa 5545-x Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5545-x Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5550 | - | All | All | All |
| Hardware | Cisco | Asa 5550 | - | All | All | All |
| Operating System | Cisco | Asa 5550 Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5550 Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5555-x | - | All | All | All |
| Hardware | Cisco | Asa 5555-x | - | All | All | All |
| Operating System | Cisco | Asa 5555-x Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5555-x Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5580 | - | All | All | All |
| Hardware | Cisco | Asa 5580 | - | All | All | All |
| Operating System | Cisco | Asa 5580 Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5580 Firmware | 9.10\(1.220\) | All | All | All |
| Hardware | Cisco | Asa 5585-x | - | All | All | All |
| Hardware | Cisco | Asa 5585-x | - | All | All | All |
| Operating System | Cisco | Asa 5585-x Firmware | 9.10\(1.220\) | All | All | All |
| Operating System | Cisco | Asa 5585-x Firmware | 9.10\(1.220\) | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Adaptive Security Appliance Software Kerberos Authentication Bypass Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.