CVE-2013-3436
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
19/07/2013
Last modified:
11/04/2025
Description
The default configuration of the Group Encrypted Transport VPN (GET VPN) feature on Cisco IOS uses an improper mechanism for enabling Group Domain of Interpretation (GDOI) traffic flow, which allows remote attackers to bypass the encryption policy via certain uses of UDP port 848, aka Bug ID CSCui07698.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/95460
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3436
- http://tools.cisco.com/security/center/viewAlert.x?alertId=30140
- http://www.securityfocus.com/bid/61362
- http://www.securitytracker.com/id/1028810
- https://exchange.xforce.ibmcloud.com/vulnerabilities/85868
- http://osvdb.org/95460
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3436
- http://tools.cisco.com/security/center/viewAlert.x?alertId=30140
- http://www.securityfocus.com/bid/61362
- http://www.securitytracker.com/id/1028810
- https://exchange.xforce.ibmcloud.com/vulnerabilities/85868



