Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2001-0929 | First vendor Publication | 2001-11-28 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0929 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5892 | |||
Oval ID: | oval:org.mitre.oval:def:5892 | ||
Title: | Cisco IOS Protocol Check Design Error | ||
Description: | Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. | ||
Family: | ios | Class: | vulnerability |
Reference(s): | CVE-2001-0929 | Version: | 1 |
Platform(s): | Cisco IOS | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
808 | Cisco IOS Firewall CBAC ACL Bypass IOS contains a flaw that may allow a malicious user to direct network traffic to a protected host. The issue is triggered when IOS fails to check the protocol type of return traffic which otherwise matches a dynamic access list entry. It is possible that the flaw may allow unauthorized traffic to pass into a protected network. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch File : cisco-sa-20011128-ios-cbac-dynaclhttp.nasl - Type : ACT_GATHER_INFO |
2002-06-05 | Name : The remote device is missing a vendor-supplied security patch. File : CSCdv48261.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:24:06 |
|
2024-11-28 12:04:42 |
|
2021-05-04 12:01:28 |
|
2021-04-22 01:01:37 |
|
2020-05-23 00:14:44 |
|
2017-10-10 09:23:22 |
|
2016-06-28 14:57:01 |
|
2014-02-17 10:24:03 |
|
2013-05-11 12:05:47 |
|