5.9
CVE-2013-3587
- EPSS 14.66%
- Published 21.02.2020 18:15:11
- Last modified 21.11.2024 01:53:56
- Source cret@cert.org
- Teams watchlist Login
- Open Login
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
Data is provided by the National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version >= 10.1.0 <= 10.2.4
F5 ≫ Big-ip Access Policy Manager Version >= 11.0.0 <= 11.6.1
F5 ≫ Big-ip Access Policy Manager Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Access Policy Manager Version13.0.0
F5 ≫ Big-ip Advanced Firewall Manager Version >= 11.3.0 <= 11.6.1
F5 ≫ Big-ip Advanced Firewall Manager Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Advanced Firewall Manager Version13.0.0
F5 ≫ Big-ip Analytics Version >= 11.0.0 <= 11.6.1
F5 ≫ Big-ip Analytics Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Analytics Version13.0.0
F5 ≫ Big-ip Application Acceleration Manager Version >= 11.4.0 <= 11.6.1
F5 ≫ Big-ip Application Acceleration Manager Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Application Acceleration Manager Version13.0.0
F5 ≫ Big-ip Application Security Manager Version >= 9.2.0 <= 9.4.8
F5 ≫ Big-ip Application Security Manager Version >= 10.0.0 <= 10.2.4
F5 ≫ Big-ip Application Security Manager Version >= 11.0.0 <= 11.6.1
F5 ≫ Big-ip Application Security Manager Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Application Security Manager Version13.0.0
F5 ≫ Big-ip Edge Gateway Version >= 10.1.0 <= 10.2.4
F5 ≫ Big-ip Edge Gateway Version >= 11.0.0 <= 11.3.0
F5 ≫ Big-ip Link Controller Version >= 9.2.2 <= 9.4.8
F5 ≫ Big-ip Link Controller Version >= 10.0.0 <= 10.2.4
F5 ≫ Big-ip Link Controller Version >= 11.0.0 <= 11.6.1
F5 ≫ Big-ip Link Controller Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Link Controller Version13.0.0
F5 ≫ Big-ip Local Traffic Manager Version >= 9.0.0 <= 9.6.1
F5 ≫ Big-ip Local Traffic Manager Version >= 10.0.0 <= 10.2.4
F5 ≫ Big-ip Local Traffic Manager Version >= 11.0.0 <= 11.6.1
F5 ≫ Big-ip Local Traffic Manager Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Local Traffic Manager Version13.0.0
F5 ≫ Big-ip Policy Enforcement Manager Version >= 11.3.0 <= 11.6.1
F5 ≫ Big-ip Policy Enforcement Manager Version >= 12.0.0 <= 12.1.2
F5 ≫ Big-ip Policy Enforcement Manager Version13.0.0
F5 ≫ Big-ip Protocol Security Module Version >= 9.4.5 <= 9.4.8
F5 ≫ Big-ip Protocol Security Module Version >= 10.0.0 <= 10.2.4
F5 ≫ Big-ip Protocol Security Module Version >= 11.0.0 <= 11.4.1
F5 ≫ Big-ip Wan Optimization Manager Version >= 10.0.0 <= 10.2.4
F5 ≫ Big-ip Wan Optimization Manager Version >= 11.0.0 <= 11.3.0
F5 ≫ Big-ip Webaccelerator Version >= 9.4.0 <= 9.4.8
F5 ≫ Big-ip Webaccelerator Version >= 10.0.0 <= 10.2.4
F5 ≫ Big-ip Webaccelerator Version >= 11.0.0 <= 11.3.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 14.66% | 0.942 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.