CVE-2013-6979
 
Severity Score
5.4
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The VTY authentication implementation in Cisco IOS XE 03.02.xxSE and 03.03.xxSE incorrectly relies on the Linux-IOS internal-network configuration, which allows remote attackers to bypass authentication by leveraging access to a 192.168.x.2 source IP address, aka Bug ID CSCuj90227.
La implementación de autenticación de VTY en Cisco IOS XE v03.02.xxSE y v03.03.xxSE se basa incorrectamente en la configuración Linux-IOS de red interna, lo que permite a atacantes remotos evitar la autenticación mediante el aprovechamiento de acceso a una dirección IP origen 192.168.x.2, también conocido como Bug ID CSCuj90227.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2013-12-05 CVE Reserved
- 2013-12-23 CVE Published
- 2023-11-05 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://osvdb.org/101351 | Vdb Entry | |
http://www.securityfocus.com/bid/64502 | Third Party Advisory | |
http://www.securitytracker.com/id/1029537 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/89901 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6979 | 2017-08-29 |