This script is (C) 2010-2015 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch
Cisco IOS Software contains a flaw that permits the successful
prediction of TCP Initial Sequence Numbers.
This vulnerability is present in all released versions of Cisco IOS
software running on Cisco routers and switches. It only affects the
security of TCP connections that originate or terminate on the affected
Cisco device itself
it does not apply to TCP traffic forwarded through
the affected device in transit between two other hosts.
To remove the vulnerability, Cisco is offering free software upgrades
for all affected platforms. The defect is described in DDTS record
Workarounds are available that limit or deny successful exploitation
of the vulnerability by filtering traffic containing forged IP source
addresses at the perimeter of a network or directly on individual
See also :
Apply the relevant patch referenced in Cisco Security Advisory
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : true
Nessus Plugin ID: 48953 (cisco-sa-20010301-ios-tcp-isn-randomhttp.nasl)
Bugtraq ID: 2682
CVE ID: CVE-2001-0288
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.