var-201310-0538
Vulnerability from variot
The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815. Vendors have confirmed this vulnerability Bug ID CSCuh44815 It is released as.By a third party ASDM To the interface TCP Authentication may be bypassed through the session. Successfully exploiting this issue will allow attackers to bypass the digital certificate authentication and gain unauthorized access to the affected device. This issue is tracked by Cisco Bug ID CSCuh44815. certified. A remote attacker can use this vulnerability to bypass authentication, log in to the system management interface as an administrator, and then control the entire system. The following versions are affected: Cisco Adaptive Security Appliance Software 8.2.x prior to 8.2(5.46), 8.3.x prior to 8.3(2.39), 8.4.x prior to 8.4(6), 8.5 prior to 8.5(1.18) .x version, 8.6.x version before 8.6(1.12), 8.7.x version before 8.7(1.7), 9.0.x version before 9.0(3.1), 9.1.x version before 9.1(2.6)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0538", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(4.4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.3\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(5.38\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.6\\(1.10\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(5.35\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.6\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7\\(1.3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(4.1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(2.34\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1.17\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(4.11\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(3.9\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(1.11\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(1.3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(2.37\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1.4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(1.7\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(2.11\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(4\\)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.5.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.3(2.39)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.6.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.2(5.46)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5(1.18)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.4(6.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1(2.6)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.4.x" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.7.x" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.2.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.7(1.7)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.0.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.6(1.12)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.1.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.0(3.1)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.3.x" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "db": "NVD", "id": "CVE-2013-5511" }, { "db": "CNNVD", "id": "CNNVD-201310-239" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.34\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.37\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(4.11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.17\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\(1.3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(1.7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-5511" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "62917" } ], "trust": 0.3 }, "cve": "CVE-2013-5511", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2013-5511", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-65513", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-5511", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201310-239", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-65513", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65513" }, { "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "db": "NVD", "id": "CVE-2013-5511" }, { "db": "CNNVD", "id": "CNNVD-201310-239" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815. Vendors have confirmed this vulnerability Bug ID CSCuh44815 It is released as.By a third party ASDM To the interface TCP Authentication may be bypassed through the session. \nSuccessfully exploiting this issue will allow attackers to bypass the digital certificate authentication and gain unauthorized access to the affected device. \nThis issue is tracked by Cisco Bug ID CSCuh44815. certified. A remote attacker can use this vulnerability to bypass authentication, log in to the system management interface as an administrator, and then control the entire system. The following versions are affected: Cisco Adaptive Security Appliance Software 8.2.x prior to 8.2(5.46), 8.3.x prior to 8.3(2.39), 8.4.x prior to 8.4(6), 8.5 prior to 8.5(1.18) .x version, 8.6.x version before 8.6(1.12), 8.7.x version before 8.7(1.7), 9.0.x version before 9.0(3.1), 9.1.x version before 9.1(2.6)", "sources": [ { "db": "NVD", "id": "CVE-2013-5511" }, { "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "db": "BID", "id": "62917" }, { "db": "VULHUB", "id": "VHN-65513" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5511", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2013-004646", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201310-239", "trust": 0.7 }, { "db": "CISCO", "id": "20131009 MULTIPLE VULNERABILITIES IN CISCO ASA SOFTWARE", "trust": 0.6 }, { "db": "BID", "id": "62917", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-65513", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65513" }, { "db": "BID", "id": "62917" }, { "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "db": "NVD", "id": "CVE-2013-5511" }, { "db": "CNNVD", "id": "CNNVD-201310-239" } ] }, "id": "VAR-201310-0538", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65513" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:09:00.647000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20131009-asa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131009-asa" }, { "title": "Digital Certificate HTTP Authentication Bypass Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5511" }, { "title": "31103", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31103" }, { "title": "cisco-sa-20131009-asa", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1119/1119989_cisco-sa-20131009-asa-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004646" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65513" }, { "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "db": "NVD", "id": "CVE-2013-5511" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131009-asa" }, { "trust": 1.1, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5511" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5511" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5511" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps6120/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65513" }, { "db": "BID", "id": "62917" }, { "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "db": "NVD", "id": "CVE-2013-5511" }, { "db": "CNNVD", "id": "CNNVD-201310-239" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65513" }, { "db": "BID", "id": "62917" }, { "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "db": "NVD", "id": "CVE-2013-5511" }, { "db": "CNNVD", "id": "CNNVD-201310-239" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-13T00:00:00", "db": "VULHUB", "id": "VHN-65513" }, { "date": "2013-10-09T00:00:00", "db": "BID", "id": "62917" }, { "date": "2013-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "date": "2013-10-13T10:20:04.333000", "db": "NVD", "id": "CVE-2013-5511" }, { "date": "2013-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-239" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-01T00:00:00", "db": "VULHUB", "id": "VHN-65513" }, { "date": "2013-10-09T00:00:00", "db": "BID", "id": "62917" }, { "date": "2014-01-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004646" }, { "date": "2023-08-15T15:14:43.030000", "db": "NVD", "id": "CVE-2013-5511" }, { "date": "2013-11-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-239" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-239" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ASA Software ASDM Vulnerabilities that prevent authentication in the remote management function", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004646" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-239" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.