Lucene search

K
cve[email protected]CVE-2013-5511
HistoryOct 13, 2013 - 10:20 a.m.

CVE-2013-5511

2013-10-1310:20:04
CWE-287
web.nvd.nist.gov
25
cisco
adaptive security appliance
asdm
remote management
authentication bypass
tcp session
cve-2013-5511

7 High

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.005 Low

EPSS

Percentile

75.2%

The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815.

Affected configurations

NVD
Node
ciscoadaptive_security_appliance_softwareMatch8.2
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(3\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(3.9\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(4\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(4.1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(4.4\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(5\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(5.35\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(5.38\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2interim
OR
ciscoadaptive_security_appliance_softwareMatch8.2.3
OR
ciscoadaptive_security_appliance_softwareMatch8.3\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.3\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch8.3\(2.34\)
OR
ciscoadaptive_security_appliance_softwareMatch8.3\(2.37\)
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1interim
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2
OR
ciscoadaptive_security_appliance_softwareMatch8.4
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(1.11\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(2.11\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(3\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(4.11\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(5\)
OR
ciscoadaptive_security_appliance_softwareMatch8.5
OR
ciscoadaptive_security_appliance_softwareMatch8.5\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.5\(1.4\)
OR
ciscoadaptive_security_appliance_softwareMatch8.5\(1.17\)
OR
ciscoadaptive_security_appliance_softwareMatch8.6
OR
ciscoadaptive_security_appliance_softwareMatch8.6\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.6\(1.3\)
OR
ciscoadaptive_security_appliance_softwareMatch8.6\(1.10\)
OR
ciscoadaptive_security_appliance_softwareMatch8.7\(1.3\)
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1
OR
ciscoadaptive_security_appliance_softwareMatch8.7.1.1
OR
ciscoadaptive_security_appliance_softwareMatch9.0
OR
ciscoadaptive_security_appliance_softwareMatch9.1
OR
ciscoadaptive_security_appliance_softwareMatch9.1\(1.7\)

7 High

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.005 Low

EPSS

Percentile

75.2%