ID

VAR-201308-0213


CVE

CVE-2013-3466


TITLE

Cisco Secure Access Control Server of EAP-FAST An arbitrary command execution vulnerability in the authentication module

Trust: 0.8

sources: JVNDB: JVNDB-2013-003937

DESCRIPTION

The EAP-FAST authentication module in Cisco Secure Access Control Server (ACS) 4.x before 4.2.1.15.11, when a RADIUS server configuration is enabled, does not properly parse user identities, which allows remote attackers to execute arbitrary commands via crafted EAP-FAST packets, aka Bug ID CSCui57636. Vendors have confirmed this vulnerability Bug ID CSCui57636 It is released as.Skillfully crafted by a third party EAP-FAST An arbitrary command may be executed via a packet. Remote attackers can exploit this issue to execute arbitrary commands. This may facilitate a complete compromise of an affected device. This issue being tracked by Cisco Bug ID CSCui57636. When the RADIUS server configuration is enabled, the program does not correctly resolve user identities

Trust: 1.98

sources: NVD: CVE-2013-3466 // JVNDB: JVNDB-2013-003937 // BID: 62028 // VULHUB: VHN-63468

AFFECTED PRODUCTS

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.6

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.2

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.1

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.9

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.3

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.8

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.0

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.4

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.7

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:lteversion:4.2.1.15.10

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:ltversion:4.x

Trust: 0.8

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.11

Trust: 0.8

vendor:ciscomodel:secure access control serverscope:eqversion:4.2.1.15.10

Trust: 0.6

vendor:ciscomodel:secure acs for windows build patscope:eqversion:4.2(0)124

Trust: 0.3

vendor:ciscomodel:secure acs for windows build patcscope:eqversion:4.1(4)13

Trust: 0.3

vendor:ciscomodel:secure acs for windowsscope:eqversion:4.1

Trust: 0.3

sources: BID: 62028 // JVNDB: JVNDB-2013-003937 // CNNVD: CNNVD-201308-452 // NVD: CVE-2013-3466

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3466
value: HIGH

Trust: 1.0

NVD: CVE-2013-3466
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201308-452
value: CRITICAL

Trust: 0.6

VULHUB: VHN-63468
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-3466
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-63468
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-63468 // JVNDB: JVNDB-2013-003937 // CNNVD: CNNVD-201308-452 // NVD: CVE-2013-3466

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-63468 // JVNDB: JVNDB-2013-003937 // NVD: CVE-2013-3466

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201308-452

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201308-452

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003937

PATCH

title:cisco-sa-20130828-acsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130828-acs

Trust: 0.8

title:30441url:http://tools.cisco.com/security/center/viewAlert.x?alertId=30441

Trust: 0.8

title:cisco-sa-20130828-acsurl:http://www.cisco.com/cisco/web/support/JP/111/1119/1119802_cisco-sa-20130828-acs-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-003937

EXTERNAL IDS

db:NVDid:CVE-2013-3466

Trust: 2.8

db:SECTRACKid:1028958

Trust: 1.1

db:OSVDBid:96668

Trust: 1.1

db:BIDid:62028

Trust: 1.0

db:JVNDBid:JVNDB-2013-003937

Trust: 0.8

db:CNNVDid:CNNVD-201308-452

Trust: 0.7

db:CISCOid:20130828 CISCO SECURE ACCESS CONTROL SERVER REMOTE COMMAND EXECUTION VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-63468

Trust: 0.1

sources: VULHUB: VHN-63468 // BID: 62028 // JVNDB: JVNDB-2013-003937 // CNNVD: CNNVD-201308-452 // NVD: CVE-2013-3466

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130828-acs

Trust: 2.0

url:http://osvdb.org/96668

Trust: 1.1

url:http://www.securitytracker.com/id/1028958

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3466

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3466

Trust: 0.8

url:http://www.securityfocus.com/bid/62028

Trust: 0.6

url:http://tools.cisco.com/security/center/viewalert.x?alertid=30441

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/secursw/ps2086/index.html

Trust: 0.3

sources: VULHUB: VHN-63468 // BID: 62028 // JVNDB: JVNDB-2013-003937 // CNNVD: CNNVD-201308-452 // NVD: CVE-2013-3466

CREDITS

Brad Antoniewicz from McAfee and Foundstone Professional Services

Trust: 0.9

sources: BID: 62028 // CNNVD: CNNVD-201308-452

SOURCES

db:VULHUBid:VHN-63468
db:BIDid:62028
db:JVNDBid:JVNDB-2013-003937
db:CNNVDid:CNNVD-201308-452
db:NVDid:CVE-2013-3466

LAST UPDATE DATE

2024-08-14T14:06:45.488000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-63468date:2016-11-07T00:00:00
db:BIDid:62028date:2013-08-28T00:00:00
db:JVNDBid:JVNDB-2013-003937date:2013-09-02T00:00:00
db:CNNVDid:CNNVD-201308-452date:2013-08-30T00:00:00
db:NVDid:CVE-2013-3466date:2016-11-07T14:59:50.250

SOURCES RELEASE DATE

db:VULHUBid:VHN-63468date:2013-08-29T00:00:00
db:BIDid:62028date:2013-08-28T00:00:00
db:JVNDBid:JVNDB-2013-003937date:2013-09-02T00:00:00
db:CNNVDid:CNNVD-201308-452date:2013-08-29T00:00:00
db:NVDid:CVE-2013-3466date:2013-08-29T12:07:53.977