The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.

Project Subscriptions

Vendors Products
Adaptive Security Appliance Software Subscribe
Adaptive Security Virtual Appliance Subscribe
Asa 1000v Cloud Firewall Subscribe
Asa 5505 Subscribe
Asa 5512-x Subscribe
Asa 5515-x Subscribe
Asa 5525-x Subscribe
Asa 5545-x Subscribe
Asa 5555-x Subscribe
Asa 5580 Subscribe
Asa 5585-x Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2014-3407 The Smart Call Home (SCH) implementation in Cisco ASA Software 8.2 before 8.2(5.50), 8.4 before 8.4(7.15), 8.6 before 8.6(1.14), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to bypass certificate validation via an arbitrary VeriSign certificate, aka Bug ID CSCun10916.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-06T10:43:05.539Z

Reserved: 2014-05-07T00:00:00

Link: CVE-2014-3394

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-10-10T10:55:06.680

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses