Cisco IOS established Keyword ACL Bypass (CSCdi34061)

medium Nessus Plugin ID 10973

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The remote device seems to be vulnerable to a flaw in IOS when the keyword 'established' is being used in the ACLs.

This bug can, under very specific circumstances and only with certain IP host implementations, allow unauthorized packets to circumvent a filtering router.

This vulnerability is documented as Cisco Bug ID CSCdi34061.

Solution

http://www.nessus.org/u?096cac5c

Plugin Details

Severity: Medium

ID: 10973

File Name: CSCdi34061.nasl

Version: 1.22

Type: local

Family: CISCO

Published: 6/5/2002

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/community, SNMP/sysDesc, CISCO/model

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/10/1992

Reference Information

CVE: CVE-1999-0162

BID: 315