Vulnerability Details : CVE-2013-3436
The default configuration of the Group Encrypted Transport VPN (GET VPN) feature on Cisco IOS uses an improper mechanism for enabling Group Domain of Interpretation (GDOI) traffic flow, which allows remote attackers to bypass the encryption policy via certain uses of UDP port 848, aka Bug ID CSCui07698.
Exploit prediction scoring system (EPSS) score for CVE-2013-3436
Probability of exploitation activity in the next 30 days: 0.48%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-3436
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-3436
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3436
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3436
Cisco IOS GET VPN Encryption Policy Bypass VulnerabilityVendor Advisory
-
http://www.securityfocus.com/bid/61362
Cisco IOS GET VPN Encryption Policy CVE-2013-3436 Security Bypass Vulnerability
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=30140
Cisco IOS GET VPN Encryption Policy Bypass VulnerabilityVendor Advisory
-
http://www.securitytracker.com/id/1028810
Cisco IOS Group Encrypted Transport VPN Bug Lets Remote Users Bypass Encryption Policy - SecurityTracker
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/85868
Cisco IOS CVE-2013-3436 security bypass CVE-2013-3436 Vulnerability Report
Products affected by CVE-2013-3436
- cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*