CVE-2010-0568
Published Feb 19, 2010
Last updated 7 years ago
Overview
- Description
- Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.7), 8.1 before 8.1(2.40), and 8.2 before 8.2(2.1); and Cisco PIX 500 Series Security Appliance; allows remote attackers to bypass NTLMv1 authentication via a crafted username, aka Bug ID CSCte21953.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "856917BD-179B-4C43-8EA6-034254720B63" }, { "criteria": "cpe:2.3:h:cisco:asa_5500:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "800D4D6A-0814-4D83-8E66-945687AE58D0" }, { "criteria": "cpe:2.3:h:cisco:asa_5500:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0810F1FB-120C-4F4C-A9A7-6AA76227A4AD" }, { "criteria": "cpe:2.3:h:cisco:asa_5500:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F50FA336-1365-4449-86B6-855C06E4F516" }, { "criteria": "cpe:2.3:h:cisco:asa_5500:8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CBF542E-2454-4F54-93F6-8D003E06F9D7" }, { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374" } ], "operator": "OR" } ] } ]