Vulnerability Details : CVE-2013-5509
The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 before 9.0(2.6) and 9.1 before 9.1(2) allows remote attackers to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCuf52468.
Exploit prediction scoring system (EPSS) score for CVE-2013-5509
Probability of exploitation activity in the next 30 days: 0.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 71 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-5509
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2013-5509
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-5509
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa
Multiple Vulnerabilities in Cisco ASA SoftwareVendor Advisory
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5509
Cisco Adaptive Security Appliance Software Digital Certificate Authentication Bypass VulnerabilityVendor Advisory
Products affected by CVE-2013-5509
- cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*