[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-11495":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":45,"name":46,"published":47,"updated":34},11495,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":35,"public_description":36,"public_recommendation":37,"recommendation":34,"references":38,"cvssv3":34,"epss_score":40,"epss_percentile":41,"cve":42,"in_cisa_catalog":44,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"The vulnerability is due to improper handling of secured failover communication messages when the failover ipsec feature is configured. An attacker could exploit this vulnerability by sending crafted UDP packets directed to the failover interface IP address. An attacker needs IP connectivity to the failover interface IP addresses to exploit this vulnerability. An unauthenticated, adjacent attacker could exploit this vulnerability by sending crafted UDP packets directed to the failover interface IP address of a targeted device. If successful, the attacker could inject arbitrary failover commands to the standby failover device, which may result in a complete system compromise of both the active and standby devices.","Cisco ASA is prone to a failover command injection vulnerability.","See the referenced vendor advisory for a solution.",[39],"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa",0.00214,0.43939,[43],"CVE-2015-0675",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.105998","Cisco ASA Software Failover Command Injection Vulnerability (cisco-sa-20150408-asa)","2018-01-02T00:00:00Z"]