Lucene search

K
ciscoCiscoCISCO-SA-20131104-CVE-2013-5561
HistoryNov 04, 2013 - 8:59 p.m.

Cisco ASA CX Safe Search Policy Bypass Vulnerability

2013-11-0420:59:34
tools.cisco.com
13

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

59.5%

A vulnerability in the Safe Search enforcement component of Cisco ASA CX Context-Aware Security could allow an unauthenticated, remote attacker to bypass security policy enforced by the affected component.

The vulnerability is due to improper implementation of the logic that should perform the filtering action. An attacker could exploit this vulnerability by sending a crafted HTTP request through the affected system.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

To exploit this vulnerability, an attacker must have the ability to send a crafted HTTP requests through a targeted device which may reside on trusted, internal networks in which the attacker would likely need access to. This access requirement decreases the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoasa_cx_context-aware_security_softwareMatchany
OR
ciscoasa_cx_context-aware_security_softwareMatchany
VendorProductVersionCPE
ciscoasa_cx_context-aware_security_softwareanycpe:2.3:a:cisco:asa_cx_context-aware_security_software:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

59.5%

Related for CISCO-SA-20131104-CVE-2013-5561