Vulnerability Details : CVE-2013-3463
The protocol-inspection feature on Cisco Adaptive Security Appliances (ASA) devices does not properly implement the idle timeout, which allows remote attackers to cause a denial of service (connection-table exhaustion) via crafted requests that use an inspected protocol, aka Bug ID CSCuh13899.
Vulnerability category: Denial of service
Products affected by CVE-2013-3463
- cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-3463
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-3463
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2013-3463
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3463
-
http://www.securitytracker.com/id/1028968
Cisco ASA Idle Timeout Processing Flaw Lets Remote Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=30607
Cisco ASA Protocol Inspection Connection Table Denial of Service VulnerabilityVendor Advisory
-
http://www.securityfocus.com/bid/62068
Cisco Adaptive Security Appliance CVE-2013-3463 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3463
Cisco ASA Protocol Inspection Connection Table Denial of Service VulnerabilityVendor Advisory
Jump to