This script is Copyright (C) 2002-2015 Tenable Network Security, Inc.
The remote device seems to generate predictable TCP Initial Sequence
The remote host seems to generate Initial Sequence Numbers (ISN) in a weak
manner which seems to solely depend on the source and dest port of the TCP
An attacker may exploit this flaw to establish spoofed connections to the
The Raptor Firewall and Novell NetWare are known to be vulnerable to this
flaw, although other network devices may be vulnerable as well.
See also :
If you are using a Raptor Firewall, install the TCP security hotfix
described in Symantec's advisory. Otherwise, contact your vendor for
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : true
Nessus Plugin ID: 11057 ()
Bugtraq ID: 53878652
CVE ID: CVE-2002-1463
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.