Cisco IOS TCP Sequence Prediction Connection Hijacking (CSCds04747)

high Nessus Plugin ID 10976

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Cisco IOS Software contains a flaw that permits the successful prediction of TCP Initial Sequence Numbers.

This vulnerability is present in all released versions of Cisco IOS software running on Cisco routers and switches. It only affects the security of TCP connections that originate or terminate on the affected Cisco device itself; it does not apply to TCP traffic forwarded through the affected device in transit between two other hosts.

This vulnerability is documented as Cisco bug ID CSCds04747.

Solution

http://www.nessus.org/u?021e980a

Plugin Details

Severity: High

ID: 10976

File Name: CSCds04747.nasl

Version: 1.26

Type: local

Family: CISCO

Published: 6/5/2002

Updated: 3/27/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/sysDesc, SNMP/community, CISCO/model

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/1/1995

Reference Information

CVE: CVE-2001-0288, CVE-2001-0328

BID: 2682