6.4
CVE-2013-6682
- EPSS 0.22%
- Veröffentlicht 13.11.2013 15:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
The phone-proxy implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier does not properly validate X.509 certificates, which allows remote attackers to cause a denial of service (connection-database corruption) via an invalid entry, aka Bug ID CSCui33299.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Adaptive Security Appliance Software Version <= 9.0.3\(6\)
Cisco ≫ Adaptive Security Appliance Software Version7.0
Cisco ≫ Adaptive Security Appliance Software Version7.0.1
Cisco ≫ Adaptive Security Appliance Software Version7.0.1.4
Cisco ≫ Adaptive Security Appliance Software Version7.0.2
Cisco ≫ Adaptive Security Appliance Software Version7.0.4
Cisco ≫ Adaptive Security Appliance Software Version7.0.4.3
Cisco ≫ Adaptive Security Appliance Software Version7.0.5
Cisco ≫ Adaptive Security Appliance Software Version7.0.6
Cisco ≫ Adaptive Security Appliance Software Version7.0.7
Cisco ≫ Adaptive Security Appliance Software Version7.0.8
Cisco ≫ Adaptive Security Appliance Software Version7.0.8 Updateinterim
Cisco ≫ Adaptive Security Appliance Software Version7.1
Cisco ≫ Adaptive Security Appliance Software Version7.1.1
Cisco ≫ Adaptive Security Appliance Software Version7.1.2
Cisco ≫ Adaptive Security Appliance Software Version7.2
Cisco ≫ Adaptive Security Appliance Software Version7.2.1
Cisco ≫ Adaptive Security Appliance Software Version7.2.2
Cisco ≫ Adaptive Security Appliance Software Version7.2.3
Cisco ≫ Adaptive Security Appliance Software Version7.2.4
Cisco ≫ Adaptive Security Appliance Software Version7.2.5
Cisco ≫ Adaptive Security Appliance Software Version8.0
Cisco ≫ Adaptive Security Appliance Software Version8.0.2
Cisco ≫ Adaptive Security Appliance Software Version8.0.3
Cisco ≫ Adaptive Security Appliance Software Version8.0.4
Cisco ≫ Adaptive Security Appliance Software Version8.0.5
Cisco ≫ Adaptive Security Appliance Software Version8.1
Cisco ≫ Adaptive Security Appliance Software Version8.2
Cisco ≫ Adaptive Security Appliance Software Version8.2.1
Cisco ≫ Adaptive Security Appliance Software Version8.2.2
Cisco ≫ Adaptive Security Appliance Software Version8.2.2 Updateinterim
Cisco ≫ Adaptive Security Appliance Software Version8.2.3
Cisco ≫ Adaptive Security Appliance Software Version8.3.1
Cisco ≫ Adaptive Security Appliance Software Version8.3.1 Updateinterim
Cisco ≫ Adaptive Security Appliance Software Version8.3.2
Cisco ≫ Adaptive Security Appliance Software Version8.4
Cisco ≫ Adaptive Security Appliance Software Version8.5
Cisco ≫ Adaptive Security Appliance Software Version8.6
Cisco ≫ Adaptive Security Appliance Software Version8.7
Cisco ≫ Adaptive Security Appliance Software Version8.7.1
Cisco ≫ Adaptive Security Appliance Software Version8.7.1.1
Cisco ≫ Adaptive Security Appliance Software Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.22% | 0.411 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.4 | 10 | 4.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.