ID

VAR-200803-0169


CVE

CVE-2008-1246


TITLE

Cisco PIX/ASA Enable Login Prompt Privilege Escalation Vulnerability

Trust: 0.9

sources: BID: 27457 // CNNVD: CNNVD-200803-124

DESCRIPTION

The Cisco PIX/ASA Finesse Operation System 7.1 and 7.2 allows local users to gain privileges by entering characters at the enable prompt, erasing these characters via the Backspace key, and then holding down the Backspace key for one second after erasing the final character. NOTE: third parties, including one who works for the vendor, have been unable to reproduce the flaw unless the enable password is blank. Cisco Systems Cisco PIX/ASA Finesse Operation System contains vulnerabilities related to authorization, privileges, and access control.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Cisco PIX and ASA are potentially prone to a privilege-escalation vulnerability. Exploiting this issue allows authenticated attackers to gain administrative privileges on affected devices. This may facilitate the complete compromise of the affected device. This issue affects the Cisco PIX/ASA operating system Finesse 7.1 and 7.2. Other versions may also be affected. This issue may be related to the one documented in BID 22562 (Cisco PIX/ASA Privilege Escalation Vulnerability), but not enough information is currently available to confirm this. Note that Cisco cannot reproduce this issue at this time

Trust: 1.98

sources: NVD: CVE-2008-1246 // JVNDB: JVNDB-2008-006676 // BID: 27457 // VULHUB: VHN-31371

AFFECTED PRODUCTS

vendor:ciscomodel:pix asa finesse operation systemscope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:pix asa finesse operation systemscope:eqversion:7.1

Trust: 1.6

vendor:シスコシステムズmodel:cisco pix/asa finesse operation systemscope:eqversion:7.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco pix/asa finesse operation systemscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco pix/asa finesse operation systemscope:eqversion:7.2

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)006

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.24)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.55)

Trust: 0.3

sources: BID: 27457 // JVNDB: JVNDB-2008-006676 // CNNVD: CNNVD-200803-124 // NVD: CVE-2008-1246

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1246
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2008-1246
value: HIGH

Trust: 1.0

NVD: CVE-2008-1246
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200803-124
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31371
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1246
severity: MEDIUM
baseScore: 6.8
vectorString: AV:L/AC:L/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31371
severity: MEDIUM
baseScore: 6.8
vectorString: AV:L/AC:L/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2008-1246
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-31371 // JVNDB: JVNDB-2008-006676 // CNNVD: CNNVD-200803-124 // NVD: CVE-2008-1246 // NVD: CVE-2008-1246

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.1

problemtype:Authorization / authority / access control (CWE-264) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-31371 // JVNDB: JVNDB-2008-006676 // NVD: CVE-2008-1246

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200803-124

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200803-124

PATCH

title:Top Pageurl:https://www.cisco.com/

Trust: 0.8

sources: JVNDB: JVNDB-2008-006676

EXTERNAL IDS

db:NVDid:CVE-2008-1246

Trust: 3.6

db:BIDid:27457

Trust: 2.0

db:JVNDBid:JVNDB-2008-006676

Trust: 0.8

db:CNNVDid:CNNVD-200803-124

Trust: 0.7

db:BUGTRAQid:20080301 THE ROUTER HACKING CHALLENGE IS OVER!

Trust: 0.6

db:BUGTRAQid:20080125 RE: RE: PIX PRIVILEGE ESCALATION VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20080205 RE: RE: PIX PRIVILEGE ESCALATION VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20080124 PIX PRIVILEGE ESCALATION VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20080124 RE: PIX PRIVILEGE ESCALATION VULNERABILITY

Trust: 0.6

db:XFid:41129

Trust: 0.6

db:VULHUBid:VHN-31371

Trust: 0.1

sources: VULHUB: VHN-31371 // BID: 27457 // JVNDB: JVNDB-2008-006676 // CNNVD: CNNVD-200803-124 // NVD: CVE-2008-1246

REFERENCES

url:http://hackathology.blogspot.com/2008/01/pixasa-finesse-71-72-privilege.html

Trust: 2.5

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41129

Trust: 1.9

url:http://www.securityfocus.com/bid/27457

Trust: 1.7

url:http://www.securityfocus.com/archive/1/486938

Trust: 1.7

url:http://www.securityfocus.com/archive/1/486959

Trust: 1.7

url:http://www.securityfocus.com/archive/1/487051

Trust: 1.7

url:http://www.securityfocus.com/archive/1/487579

Trust: 1.7

url:http://www.gnucitizen.org/projects/router-hacking-challenge/

Trust: 1.7

url:http://www.securityfocus.com/archive/1/489009/100/0/threaded

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1246

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41129

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded

Trust: 0.6

url:http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/

Trust: 0.3

url:/archive/1/486938

Trust: 0.3

url:/archive/1/486959

Trust: 0.3

url:/archive/1/487051

Trust: 0.3

url:/archive/1/487579

Trust: 0.3

sources: VULHUB: VHN-31371 // BID: 27457 // JVNDB: JVNDB-2008-006676 // CNNVD: CNNVD-200803-124 // NVD: CVE-2008-1246

CREDITS

Terry Bunn discovered this issue.

Trust: 0.9

sources: BID: 27457 // CNNVD: CNNVD-200803-124

SOURCES

db:VULHUBid:VHN-31371
db:BIDid:27457
db:JVNDBid:JVNDB-2008-006676
db:CNNVDid:CNNVD-200803-124
db:NVDid:CVE-2008-1246

LAST UPDATE DATE

2025-04-10T20:55:10.480000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31371date:2018-10-11T00:00:00
db:BIDid:27457date:2015-05-07T17:33:00
db:JVNDBid:JVNDB-2008-006676date:2024-07-23T07:41:00
db:CNNVDid:CNNVD-200803-124date:2009-02-06T00:00:00
db:NVDid:CVE-2008-1246date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-31371date:2008-03-10T00:00:00
db:BIDid:27457date:2008-01-24T00:00:00
db:JVNDBid:JVNDB-2008-006676date:2024-07-23T00:00:00
db:CNNVDid:CNNVD-200803-124date:2008-03-10T00:00:00
db:NVDid:CVE-2008-1246date:2008-03-10T17:44:00