Executive Summary

Informations
Name CVE-2013-3466 First vendor Publication 2013-08-29
Vendor Cve Last vendor Modification 2016-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The EAP-FAST authentication module in Cisco Secure Access Control Server (ACS) 4.x before 4.2.1.15.11, when a RADIUS server configuration is enabled, does not properly parse user identities, which allows remote attackers to execute arbitrary commands via crafted EAP-FAST packets, aka Bug ID CSCui57636.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3466

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 62
Hardware 1

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-09-05 IAVM : 2013-A-0167 - Cisco Secure Access Control Server Remote Code Execution Vulnerability
Severity : Category I - VMSKEY : V0040212

Nessus® Vulnerability Scanner

Date Description
2013-09-17 Name : The remote Windows host has an access control application installed that is a...
File : cisco_secure_acs_for_windows_sa20130828.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CISCO http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
OSVDB http://osvdb.org/96668
SECTRACK http://www.securitytracker.com/id/1028958

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Date Informations
2024-02-02 01:23:48
  • Multiple Updates
2024-02-01 12:07:07
  • Multiple Updates
2023-09-05 12:22:29
  • Multiple Updates
2023-09-05 01:07:01
  • Multiple Updates
2023-09-02 12:22:31
  • Multiple Updates
2023-09-02 01:07:06
  • Multiple Updates
2023-08-22 12:20:15
  • Multiple Updates
2022-10-11 01:06:47
  • Multiple Updates
2021-05-04 12:26:56
  • Multiple Updates
2021-04-22 01:32:38
  • Multiple Updates
2020-05-23 00:37:42
  • Multiple Updates
2016-11-07 17:22:16
  • Multiple Updates
2016-09-04 01:02:24
  • Multiple Updates
2016-09-01 01:01:48
  • Multiple Updates
2016-06-28 22:22:34
  • Multiple Updates
2016-06-28 19:36:14
  • Multiple Updates
2016-04-26 23:26:16
  • Multiple Updates
2014-02-17 11:21:01
  • Multiple Updates
2013-11-11 12:40:36
  • Multiple Updates
2013-09-11 13:20:48
  • Multiple Updates
2013-09-05 21:20:28
  • Multiple Updates
2013-09-04 21:22:53
  • Multiple Updates
2013-08-30 00:20:14
  • Multiple Updates
2013-08-29 17:20:27
  • First insertion