CVE-2013-5511 (GCVE-0-2013-5511)

Vulnerability from cvelistv5 – Published: 2013-10-13 10:00 – Updated: 2024-08-06 17:15
VLAI?
Summary
The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:15:20.957Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20131213 Digital Certificate HTTP Authentication Bypass Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511"
          },
          {
            "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-17T15:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20131213 Digital Certificate HTTP Authentication Bypass Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511"
        },
        {
          "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-5511",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20131213 Digital Certificate HTTP Authentication Bypass Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511"
            },
            {
              "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-5511",
    "datePublished": "2013-10-13T10:00:00",
    "dateReserved": "2013-08-22T00:00:00",
    "dateUpdated": "2024-08-06T17:15:20.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"785388F5-E76A-4762-B498-35F69CE537AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73BA05D1-78A7-4F90-9448-3F2011EE3EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33F24697-0124-4326-8499-29931D57D246\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3.9\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7236893-3EE9-4DBE-8A75-5294FD82E922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97E5BC7E-399F-4FD2-8024-2F4F621BC577\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22E1D918-A52E-4892-9D0D-EE3E21853BD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA8018B5-4392-4D14-A017-80D325FBCB2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5.35\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4411AB6B-FC27-45B6-A9D3-45DB64D14357\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5.38\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13E658D9-155B-4567-A3F8-5F45F53457CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"465313C5-BFB9-458A-8150-8F7BA1F8C386\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C808D46-C846-4C53-A713-150C3FED3FAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C15D1F6-997D-47FD-A654-AEF3332E6105\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31BA0ED9-6962-4E19-89A1-1724AADEC669\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2.34\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37D8E4C6-9CF5-40DD-852E-B9623CDBE5B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2.37\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03794CAA-06A3-4FD8-BF00-B9A7BAE59704\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5990B883-0B5A-44F0-B4DC-8031ED0F2026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5A002AD-3EB0-43CB-AFAF-4A44DAF11007\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7F417BC-5835-4F29-8DB6-03A62B7B2364\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A914DE5-2269-451A-823A-B26AE1A7F980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69683734-528F-488A-8A90-8478FA27B97E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"691166C2-1FBD-46EB-8AA5-FCE303444ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4956430E-BEC1-4788-B0D2-E50E36C70306\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0271E71-11A1-410F-A34B-5E90FE009D4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(4.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747A3577-3D68-4F23-B465-5A40035C2246\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DC22FC-55C8-4B87-96BF-BE058E958BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"310B4795-4BC3-4F47-8F54-C513ECC2C9F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E87F3D-669C-4451-A4C4-E8FE04769248\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4154E951-DE5D-4D48-B5BA-B3CCDDA3FBA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1.17\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02BF5B23-58BD-4D1F-9F5B-30EE518E8D23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BFCE154-6582-49E2-9B9D-641986B7D653\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"563181F6-6A37-496B-AE25-0D03214BA7BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\\\(1.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62558016-D31D-405E-A264-40DBBDF23887\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\\\(1.10\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CF663E3-9CA5-4E11-B58F-CAC012F2C397\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\\\(1.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4FDA1C7-3CFC-4DFC-8DE7-ED54636ED1A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75B5CF41-7F01-4AE9-B54B-8DB6909504B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F995B807-32A2-401F-99D5-FBBA8B69E844\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64230D9-75E1-40C0-8889-43F1035F5B60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(1.7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D234DF9-39EB-4AD3-942A-0AED8D11F5D7\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad de gesti\\u00f3n remota de Adaptive Security Device Management (ASDM) en Cisco Adaptive Security Appliance (ASA) Software 8.2.x anteriores a 8.2(5.46), 8.3.x anteriores a 8.3(2.39), 8.4.x anteriores a 8.4(6), 8.5.x anteriores a 8.5(1.18), 8.6.x anteriores a 8.6(1.12), 8.7.x anteriores a 8.7(1.7), 9.0.x anteriores a 9.0(3.1), y 9.1.x anteriores a 9.1(2.6) no implementa correctamente la opci\\u00f3n de certificado de autenticaci\\u00f3n, lo cual permite a atacantes remotos sortear la autenticaci\\u00f3n a trav\\u00e9s de una sesi\\u00f3n TCP a una interfaz ASDM, tambi\\u00e9n conocido como Bug ID CSCuh44815.\"}]",
      "id": "CVE-2013-5511",
      "lastModified": "2024-11-21T01:57:37.017",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2013-10-13T10:20:04.333",
      "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-5511\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2013-10-13T10:20:04.333\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad de gesti\u00f3n remota de Adaptive Security Device Management (ASDM) en Cisco Adaptive Security Appliance (ASA) Software 8.2.x anteriores a 8.2(5.46), 8.3.x anteriores a 8.3(2.39), 8.4.x anteriores a 8.4(6), 8.5.x anteriores a 8.5(1.18), 8.6.x anteriores a 8.6(1.12), 8.7.x anteriores a 8.7(1.7), 9.0.x anteriores a 9.0(3.1), y 9.1.x anteriores a 9.1(2.6) no implementa correctamente la opci\u00f3n de certificado de autenticaci\u00f3n, lo cual permite a atacantes remotos sortear la autenticaci\u00f3n a trav\u00e9s de una sesi\u00f3n TCP a una interfaz ASDM, tambi\u00e9n conocido como Bug ID CSCuh44815.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"785388F5-E76A-4762-B498-35F69CE537AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73BA05D1-78A7-4F90-9448-3F2011EE3EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F24697-0124-4326-8499-29931D57D246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3.9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7236893-3EE9-4DBE-8A75-5294FD82E922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E5BC7E-399F-4FD2-8024-2F4F621BC577\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E1D918-A52E-4892-9D0D-EE3E21853BD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA8018B5-4392-4D14-A017-80D325FBCB2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5.35\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4411AB6B-FC27-45B6-A9D3-45DB64D14357\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(5.38\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E658D9-155B-4567-A3F8-5F45F53457CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C808D46-C846-4C53-A713-150C3FED3FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C15D1F6-997D-47FD-A654-AEF3332E6105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31BA0ED9-6962-4E19-89A1-1724AADEC669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2.34\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D8E4C6-9CF5-40DD-852E-B9623CDBE5B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\\\(2.37\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03794CAA-06A3-4FD8-BF00-B9A7BAE59704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990B883-0B5A-44F0-B4DC-8031ED0F2026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5A002AD-3EB0-43CB-AFAF-4A44DAF11007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F417BC-5835-4F29-8DB6-03A62B7B2364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A914DE5-2269-451A-823A-B26AE1A7F980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69683734-528F-488A-8A90-8478FA27B97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691166C2-1FBD-46EB-8AA5-FCE303444ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4956430E-BEC1-4788-B0D2-E50E36C70306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0271E71-11A1-410F-A34B-5E90FE009D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(4.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747A3577-3D68-4F23-B465-5A40035C2246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DC22FC-55C8-4B87-96BF-BE058E958BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"310B4795-4BC3-4F47-8F54-C513ECC2C9F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E87F3D-669C-4451-A4C4-E8FE04769248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4154E951-DE5D-4D48-B5BA-B3CCDDA3FBA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\\\(1.17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BF5B23-58BD-4D1F-9F5B-30EE518E8D23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BFCE154-6582-49E2-9B9D-641986B7D653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563181F6-6A37-496B-AE25-0D03214BA7BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\\\(1.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62558016-D31D-405E-A264-40DBBDF23887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\\\(1.10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF663E3-9CA5-4E11-B58F-CAC012F2C397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\\\(1.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FDA1C7-3CFC-4DFC-8DE7-ED54636ED1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B5CF41-7F01-4AE9-B54B-8DB6909504B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F995B807-32A2-401F-99D5-FBBA8B69E844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64230D9-75E1-40C0-8889-43F1035F5B60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(1.7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D234DF9-39EB-4AD3-942A-0AED8D11F5D7\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5511\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…