First published: Sun Oct 13 2013(Updated: )
The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 before 9.0(2.6) and 9.1 before 9.1(2) allows remote attackers to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCuf52468.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =9.0 | |
Cisco Adaptive Security Appliance Software | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5509 has a high severity rating due to its potential to allow unauthorized VPN and administrative access.
To resolve CVE-2013-5509, upgrade the Cisco Adaptive Security Appliance software to version 9.0(2.6) or 9.1(2) or later.
CVE-2013-5509 affects Cisco Adaptive Security Appliance software versions 9.0 before 9.0(2.6) and 9.1 before 9.1(2).
CVE-2013-5509 enables remote attackers to bypass authentication mechanisms using a crafted X.509 client certificate.
The impact of CVE-2013-5509 includes the potential for attackers to gain unauthorized access to VPN services and administrative controls.