Vulnerability Description
The protocol-inspection feature on Cisco Adaptive Security Appliances (ASA) devices does not properly implement the idle timeout, which allows remote attackers to cause a denial of service (connection-table exhaustion) via crafted requests that use an inspected protocol, aka Bug ID CSCuh13899.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Adaptive Security Appliance Software | - |
| Cisco | Adaptive Security Appliance | All versions |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3463Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=30607Vendor Advisory
- http://www.securityfocus.com/bid/62068Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1028968Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3463Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=30607Vendor Advisory
- http://www.securityfocus.com/bid/62068Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1028968Third Party AdvisoryVDB Entry
FAQ
What is CVE-2013-3463?
CVE-2013-3463 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The protocol-inspection feature on Cisco Adaptive Security Appliances (ASA) devices does not properly implement the idle timeout, which allows remote attackers to cause a denial of service (connection...
How severe is CVE-2013-3463?
CVE-2013-3463 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3463?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Adaptive Security Appliance Software, Cisco Adaptive Security Appliance.