Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-cli | vendor advisory |
https://www.exploit-db.com/exploits/40271/ | exploit vdb entry third party advisory |
http://blogs.cisco.com/security/shadow-brokers | press/media coverage exploit vendor advisory |
http://www.securitytracker.com/id/1036636 | vdb entry third party advisory broken link |
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516 | vendor advisory |
http://www.securityfocus.com/bid/92520 | vdb entry third party advisory broken link |
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40271.zip | broken link exploit |