FKIE_CVE-2013-5566
Vulnerability from fkie_nvd - Published: 2013-11-08 04:47 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco NX-OS 5.0 and earlier on MDS 9000 devices allows remote attackers to cause a denial of service (supervisor CPU consumption) via Authentication Header (AH) authentication in a Virtual Router Redundancy Protocol (VRRP) frame, aka Bug ID CSCte27874.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | * | |
| cisco | nx-os | 4.0 | |
| cisco | nx-os | 4.0\(0\)n1\(1a\) | |
| cisco | nx-os | 4.0\(0\)n1\(2\) | |
| cisco | nx-os | 4.0\(0\)n1\(2a\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1\) | |
| cisco | nx-os | 4.0\(1a\)n1\(1a\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1\) | |
| cisco | nx-os | 4.0\(1a\)n2\(1a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(1\) | |
| cisco | nx-os | 4.0\(4\)sv1\(2\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3a\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3b\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3c\) | |
| cisco | nx-os | 4.0\(4\)sv1\(3d\) | |
| cisco | nx-os | 4.1\(3\)n1\(1\) | |
| cisco | nx-os | 4.1\(3\)n1\(1a\) | |
| cisco | nx-os | 4.1\(3\)n2\(1\) | |
| cisco | nx-os | 4.1\(3\)n2\(1a\) | |
| cisco | nx-os | 4.1.\(2\) | |
| cisco | nx-os | 4.1.\(3\) | |
| cisco | nx-os | 4.1.\(4\) | |
| cisco | nx-os | 4.1.\(5\) | |
| cisco | nx-os | 4.2 | |
| cisco | nx-os | 4.2\(1\) | |
| cisco | nx-os | 4.2\(1\)n1\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1\) | |
| cisco | nx-os | 4.2\(1\)n2\(1a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4\) | |
| cisco | nx-os | 4.2\(1\)sv1\(4a\) | |
| cisco | nx-os | 4.2\(1\)sv1\(5.1\) | |
| cisco | nx-os | 4.2\(2\) | |
| cisco | nx-os | 4.2\(3\) | |
| cisco | nx-os | 4.2\(4\) | |
| cisco | nx-os | 4.2\(6\) | |
| cisco | nx-os | 4.2\(8\) | |
| cisco | nx-os | 4.2.\(2a\) | |
| cisco | mds_9000 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9913B8-BE5A-4C83-8E15-9814250F4FF4",
"versionEndIncluding": "5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco NX-OS 5.0 and earlier on MDS 9000 devices allows remote attackers to cause a denial of service (supervisor CPU consumption) via Authentication Header (AH) authentication in a Virtual Router Redundancy Protocol (VRRP) frame, aka Bug ID CSCte27874."
},
{
"lang": "es",
"value": "Cisco NX-OS 5.0 y anteriores versiones en dispositivos MDS 9000 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo del supervisor de CPU) a trav\u00e9s de la autenticaci\u00f3n Authentication Header (AH) en un marco Virtual Router Redundancy Protocol, tambi\u00e9n conocido como Bug ID CSCte27874."
}
],
"id": "CVE-2013-5566",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-11-08T04:47:23.073",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5566"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5566"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31663"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…