Script http-vuln-cve2014-2126
Script types:
portrule
  Categories:
  vuln, safe
  
Download: https://svn.nmap.org/nmap/scripts/http-vuln-cve2014-2126.nse
Script Summary
Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA ASDM Privilege Escalation Vulnerability (CVE-2014-2126).
See also:
Script Arguments
- tls.servername
 See the documentation for the tls library.
- vulns.short, vulns.showall
 See the documentation for the vulns library.
- mssql.domain, mssql.instance-all, mssql.instance-name, mssql.instance-port, mssql.password, mssql.protocol, mssql.scanned-ports-only, mssql.timeout, mssql.username
 See the documentation for the mssql library.
- anyconnect.group, anyconnect.mac, anyconnect.ua, anyconnect.version
 See the documentation for the anyconnect library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
 See the documentation for the smbauth library.
- slaxml.debug
 See the documentation for the slaxml library.
- smtp.domain
 See the documentation for the smtp library.
- randomseed, smbbasic, smbport, smbsign
 See the documentation for the smb library.
- http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent
 See the documentation for the http library.
Example Usage
nmap -p 443 --script http-vuln-cve2014-2126 <target>
Script Output
PORT STATE SERVICE 443/tcp open https | http-vuln-cve2014-2126: | VULNERABLE: | Cisco ASA ASDM Privilege Escalation Vulnerability | State: VULNERABLE | Risk factor: High CVSSv2: 8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C) | Description: | Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. | | References: | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa |_ http://cvedetails.com/cve/2014-2126/
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html
