Vulnerability Details : CVE-2013-6686
The SSL VPN implementation in Cisco IOS 15.3(1)T2 and earlier allows remote authenticated users to cause a denial of service (interface queue wedge) via crafted DTLS packets in an SSL session, aka Bug IDs CSCuh97409 and CSCud90568.
Vulnerability category: Input validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-6686
Probability of exploitation activity in the next 30 days: 0.09%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 38 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-6686
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST |
CWE ids for CVE-2013-6686
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6686
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=31757
Cisco IOS Software SSL VPN Interface Queue Wedge Denial of Service VulnerabilityVendor Advisory
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6686
Cisco IOS Software SSL VPN Interface Queue Wedge Denial of Service VulnerabilityVendor Advisory
Products affected by CVE-2013-6686
- cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.0\(1\)se:*:*:*:*:*:*:*