First published: Sun Oct 13 2013(Updated: )
The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance | =8.2 | |
Cisco Adaptive Security Appliance | =8.2\(1\) | |
Cisco Adaptive Security Appliance | =8.2\(2\) | |
Cisco Adaptive Security Appliance | =8.2\(3\) | |
Cisco Adaptive Security Appliance | =8.2\(3.9\) | |
Cisco Adaptive Security Appliance | =8.2\(4\) | |
Cisco Adaptive Security Appliance | =8.2\(4.1\) | |
Cisco Adaptive Security Appliance | =8.2\(4.4\) | |
Cisco Adaptive Security Appliance Software | =8.2\(5\) | |
Cisco Adaptive Security Appliance Software | =8.2\(5.35\) | |
Cisco Adaptive Security Appliance Software | =8.2\(5.38\) | |
Cisco Adaptive Security Appliance Software | =8.2.1 | |
Cisco Adaptive Security Appliance Software | =8.2.2 | |
Cisco Adaptive Security Appliance Software | =8.2.2-interim | |
Cisco Adaptive Security Appliance Software | =8.2.3 | |
Cisco Adaptive Security Appliance Software | =8.3\(1\) | |
Cisco Adaptive Security Appliance Software | =8.3\(2\) | |
Cisco Adaptive Security Appliance Software | =8.3\(2.34\) | |
Cisco Adaptive Security Appliance Software | =8.3\(2.37\) | |
Cisco Adaptive Security Appliance Software | =8.3.1 | |
Cisco Adaptive Security Appliance Software | =8.3.1-interim | |
Cisco Adaptive Security Appliance Software | =8.3.2 | |
Cisco Adaptive Security Appliance Software | =8.4 | |
Cisco Adaptive Security Appliance Software | =8.4\(1\) | |
Cisco Adaptive Security Appliance Software | =8.4\(1.11\) | |
Cisco Adaptive Security Appliance Software | =8.4\(2\) | |
Cisco Adaptive Security Appliance Software | =8.4\(2.11\) | |
Cisco Adaptive Security Appliance Software | =8.4\(3\) | |
Cisco Adaptive Security Appliance Software | =8.4\(4.11\) | |
Cisco Adaptive Security Appliance Software | =8.4\(5\) | |
Cisco Adaptive Security Appliance Software | =8.5 | |
Cisco Adaptive Security Appliance Software | =8.5\(1\) | |
Cisco Adaptive Security Appliance Software | =8.5\(1.4\) | |
Cisco Adaptive Security Appliance Software | =8.5\(1.17\) | |
Cisco Adaptive Security Appliance Software | =8.6 | |
Cisco Adaptive Security Appliance Software | =8.6\(1\) | |
Cisco Adaptive Security Appliance Software | =8.6\(1.3\) | |
Cisco Adaptive Security Appliance Software | =8.6\(1.10\) | |
Cisco Adaptive Security Appliance Software | =8.7\(1.3\) | |
Cisco Adaptive Security Appliance Software | =8.7.1 | |
Cisco Adaptive Security Appliance Software | =8.7.1.1 | |
Cisco Adaptive Security Appliance Software | =9.0 | |
Cisco Adaptive Security Appliance Software | =9.1 | |
Cisco Adaptive Security Appliance Software | =9.1\(1.7\) | |
Cisco Adaptive Security Appliance Software | =8.2 | |
Cisco Adaptive Security Appliance Software | =8.2\(1\) | |
Cisco Adaptive Security Appliance Software | =8.2\(2\) | |
Cisco Adaptive Security Appliance Software | =8.2\(3\) | |
Cisco Adaptive Security Appliance Software | =8.2\(3.9\) | |
Cisco Adaptive Security Appliance Software | =8.2\(4\) | |
Cisco Adaptive Security Appliance Software | =8.2\(4.1\) | |
Cisco Adaptive Security Appliance Software | =8.2\(4.4\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5511 is classified as a high-severity vulnerability.
To fix CVE-2013-5511, you should upgrade to a patched version of Cisco Adaptive Security Appliance Software as specified in the vendor's advisory.
CVE-2013-5511 affects multiple versions of Cisco ASA Software including 8.2.x, 8.3.x, 8.4.x, 8.5.x, 8.6.x, 8.7.x, 9.0.x, and 9.1.x.
CVE-2013-5511 could be exploited through remote management features, leading to unauthorized access.
While the best solution is to upgrade, temporarily disabling remote management may serve as a workaround until a patch is applied.