Lucene search

K
ciscoCiscoCISCO-SA-20131113-CVE-2013-6686
HistoryNov 13, 2013 - 8:19 p.m.

Cisco IOS Software SSL VPN Interface Queue Wedge Denial of Service Vulnerability

2013-11-1320:19:00
tools.cisco.com
16

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

EPSS

0.001

Percentile

45.3%

A vulnerability in the Datagram Transport Layer Security (DTLS) function of the Cisco IOS Software SSL VPN feature could allow an authenticated, remote attacker to cause the SSL VPN gateway interface to stop processing traffic when the queue is full, resulting in a denial of service (DoS) condition.

The vulnerability is due to improper processing of specific DTLS packets. An attacker could exploit this vulnerability by creating an SSL session and then sending crafted DTLS packets. An exploit could allow the attacker to cause the SSL VPN gateway interface to become full, resulting in a DoS condition.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker would need to authenticate to the targeted device to send specific DTLS packets to the vulnerable system. This access requirement decreases the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoiosMatchany
OR
ciscoiosMatchany
VendorProductVersionCPE
ciscoiosanycpe:2.3:o:cisco:ios:any:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

EPSS

0.001

Percentile

45.3%

Related for CISCO-SA-20131113-CVE-2013-6686