CVE-2013-5663
Published Aug 31, 2013
Last updated a year ago
Overview
- Description
- The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07C92F2C-BDC6-4B92-B8E4-C7750DDFAF52", "versionEndIncluding": "4.0.8" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9547FFD1-8161-45C4-BEC9-0BC30FA46A92" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0384B38B-C69B-4DAB-9276-7B10AAAD588F" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB324D9A-7A8A-4AD6-89F7-F4F9EA2441DE" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "540806F7-4C35-43CD-8AC0-7D9FAC42FEF5" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "818D028C-627D-49A4-ACD6-44821BA5106A" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C789DFD-189D-4CF3-A3BF-B2B854BEFE9A" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30831F67-692C-497A-8F33-59F57AE2D513" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81D87787-B186-46A2-8A11-0AEDFBD17D7A" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E1861E9-228B-4A82-B885-987CEFAA7974" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C3773D9-21A6-4102-879B-C902D7F33F1F" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17BB4059-3A6E-451F-BE4F-BF14C8186F9F" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81D4D653-1BBD-4228-AE3F-62C9F75DE8AB" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27837759-0371-4A94-9E54-66155FCCB072" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEB6E3EA-ED06-4934-9349-DF0AB9B8EBB5" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5F76CD5-65D6-486C-96E1-999BF4141A38" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54019AC0-BB5E-4AD0-A06E-526BBEED83B1" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CC2A5DE-9C55-4CAE-B673-818CE29221ED" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.8-h3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33FAA6DA-4686-4C3A-A5F4-05A2FFFA479D" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E63C15B7-B83A-4ED1-99A7-71619B247645" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:4.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DF92DA6-CE52-40A5-A79A-CA9D9CFEF39B" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9560C45E-6F66-47BA-B4B5-8DFBB72E80A0" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:5.0.0-h1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD60F39D-3941-4049-90AD-102A6351291B" } ], "operator": "OR" } ] } ]