ID

VAR-201310-0537


CVE

CVE-2013-5510


TITLE

Cisco Adaptive Security Appliance Software remote access VPN Vulnerabilities that prevent authentication from being implemented

Trust: 0.8

sources: JVNDB: JVNDB-2013-004645

DESCRIPTION

The remote-access VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.6.x before 8.6(1.12), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.5), when an override-account-disable option is enabled, does not properly parse AAA LDAP responses, which allows remote attackers to bypass authentication via a VPN connection attempt, aka Bug ID CSCug83401. Vendors have confirmed this vulnerability Bug ID CSCug83401 It is released as.By a third party VPN Authentication may be bypassed through connection attempts. Cisco Adaptive Security Appliance (ASA) is prone to an authentication-bypass vulnerability. Successfully exploiting this issue will allow attackers to bypass authentication and gain unauthorized access to the affected device. This issue is tracked by Cisco Bug ID CSCug83401. The following versions are affected: Cisco Adaptive Security Appliance Software 7.x prior to 7.2(5.12), 8.x prior to 8.2(5.46), 8.3.x prior to 8.3(2.39), 8.4 prior to 8.4(6) .x version, 8.6.x version before 8.6(1.12), 9.0.x version before 9.0(3.1), 9.1.x version before 9.1(2.5)

Trust: 1.98

sources: NVD: CVE-2013-5510 // JVNDB: JVNDB-2013-004645 // BID: 62914 // VULHUB: VHN-65512

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.7\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(5\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.48\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.5\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.8\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.18\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1.22\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(3\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(4\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.8

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(8\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(5.35\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.16\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.49\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(3\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0\(3\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(4.4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(2.11\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.15\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.6\(1.10\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(4.11\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.4.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(6\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.19\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.1.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(6.7\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0\(5.28\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.10\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(5.38\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(5.2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0\(5.31\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(4.1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(0\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.27\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(1.11\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.14\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4\(3\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.6\(1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1\(1.7\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(7\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.48\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.17\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(3.9\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.7

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2(5.12)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.3(2.39)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:8.6.x

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2(5.46)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1(2)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:8.x

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4(6.6)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:8.4.x

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0(2.6)1

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.0.x

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.6(1.12)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:7.x

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.1.x

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:8.3.x

Trust: 0.8

sources: JVNDB: JVNDB-2013-004645 // CNNVD: CNNVD-201310-238 // NVD: CVE-2013-5510

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5510
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-5510
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201310-238
value: MEDIUM

Trust: 0.6

VULHUB: VHN-65512
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-5510
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-65512
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-65512 // JVNDB: JVNDB-2013-004645 // CNNVD: CNNVD-201310-238 // NVD: CVE-2013-5510

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-65512 // JVNDB: JVNDB-2013-004645 // NVD: CVE-2013-5510

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-238

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201310-238

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004645

PATCH

title:cisco-sa-20131009-asaurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa

Trust: 0.8

title:Remote Access VPN Authentication Bypass Vulnerability url:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5510

Trust: 0.8

title:31102url:http://tools.cisco.com/security/center/viewAlert.x?alertId=31102

Trust: 0.8

title:cisco-sa-20131009-asaurl:http://www.cisco.com/cisco/web/support/JP/111/1119/1119989_cisco-sa-20131009-asa-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-004645

EXTERNAL IDS

db:NVDid:CVE-2013-5510

Trust: 2.8

db:JVNDBid:JVNDB-2013-004645

Trust: 0.8

db:CNNVDid:CNNVD-201310-238

Trust: 0.7

db:CISCOid:20131009 MULTIPLE VULNERABILITIES IN CISCO ASA SOFTWARE

Trust: 0.6

db:BIDid:62914

Trust: 0.4

db:VULHUBid:VHN-65512

Trust: 0.1

sources: VULHUB: VHN-65512 // BID: 62914 // JVNDB: JVNDB-2013-004645 // CNNVD: CNNVD-201310-238 // NVD: CVE-2013-5510

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131009-asa

Trust: 1.7

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5510

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5510

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5510

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-65512 // BID: 62914 // JVNDB: JVNDB-2013-004645 // CNNVD: CNNVD-201310-238 // NVD: CVE-2013-5510

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 62914

SOURCES

db:VULHUBid:VHN-65512
db:BIDid:62914
db:JVNDBid:JVNDB-2013-004645
db:CNNVDid:CNNVD-201310-238
db:NVDid:CVE-2013-5510

LAST UPDATE DATE

2024-11-23T21:45:31.108000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-65512date:2016-11-01T00:00:00
db:BIDid:62914date:2013-10-09T00:00:00
db:JVNDBid:JVNDB-2013-004645date:2014-01-10T00:00:00
db:CNNVDid:CNNVD-201310-238date:2013-10-15T00:00:00
db:NVDid:CVE-2013-5510date:2024-11-21T01:57:36.887

SOURCES RELEASE DATE

db:VULHUBid:VHN-65512date:2013-10-13T00:00:00
db:BIDid:62914date:2013-10-09T00:00:00
db:JVNDBid:JVNDB-2013-004645date:2013-10-16T00:00:00
db:CNNVDid:CNNVD-201310-238date:2013-10-15T00:00:00
db:NVDid:CVE-2013-5510date:2013-10-13T10:20:04.303