| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.5 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Cisco IOS. It has been rated as problematic. This vulnerability affects unknown code of the component TCP Stack. Performing a manipulation results in memory corruption. This vulnerability is identified as CVE-2013-5469. There is not any exploit available. Applying a patch is the recommended action to fix this issue.
Details
A vulnerability, which was classified as critical, was found in Cisco IOS (Router Operating System) (version unknown). This affects an unknown function of the component TCP Stack. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on availability. The summary by CVE is:
The TCP implementation in Cisco IOS does not properly implement the transitions from the ESTABLISHED state to the CLOSED state, which allows remote attackers to cause a denial of service (flood of ACK packets) via a crafted series of ACK and FIN packets, aka Bug ID CSCtz14399.
The weakness was released 08/30/2013 with Cisco as CVE-2013-5469 as confirmed bulletin (Website). The advisory is shared at tools.cisco.com. This vulnerability is uniquely identified as CVE-2013-5469 since 08/22/2013. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
Applying a patch is able to eliminate this problem.
The vulnerability is also documented in the databases at X-Force (86794), SecurityFocus (BID 62083†), OSVDB (96764†), Secunia (SA54710†) and Vulnerability Center (SBV-41496†). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 6.5
VulDB Base Score: 7.5
VulDB Temp Score: 6.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
08/22/2013 🔍08/30/2013 🔍
08/30/2013 🔍
08/30/2013 🔍
08/30/2013 🔍
09/02/2013 🔍
09/03/2013 🔍
09/12/2013 🔍
05/21/2021 🔍
Sources
Vendor: cisco.comAdvisory: CVE-2013-5469
Organization: Cisco
Status: Confirmed
CVE: CVE-2013-5469 (🔍)
GCVE (CVE): GCVE-0-2013-5469
GCVE (VulDB): GCVE-100-10101
X-Force: 86794 - Cisco IOS TCP ACK denial of service, Medium Risk
SecurityFocus: 62083 - Cisco IOS CVE-2013-5469 Remote Denial of Service Vulnerability
Secunia: 54710 - Cisco IOS ACK Storm Denial of Service Vulnerability, Less Critical
OSVDB: 96764
SecurityTracker: 1028969
Vulnerability Center: 41496 - Cisco IOS Remote TCP ACK Storm DoS Vulnerability via Crafted ACK and PIN Packets, High
Entry
Created: 09/03/2013 15:01Updated: 05/21/2021 20:52
Changes: 09/03/2013 15:01 (67), 05/11/2017 08:45 (3), 05/21/2021 20:52 (3)
Complete: 🔍
Committer: olku
Cache ID: 216:826:103

No comments yet. Languages: en.
Please log in to comment.