Cisco IOS established Keyword ACL Bypass (CSCdi34061)

medium Nessus Plugin ID 10973


The remote device is missing a vendor-supplied security patch.


The remote device seems to be vulnerable to a flaw in IOS when the keyword 'established' is being used in the ACLs.

This bug can, under very specific circumstances and only with certain IP host implementations, allow unauthorized packets to circumvent a filtering router.

This vulnerability is documented as Cisco Bug ID CSCdi34061.


Plugin Details

Severity: Medium

ID: 10973

File Name: CSCdi34061.nasl

Version: 1.22

Type: local

Family: CISCO

Published: 6/5/2002

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/community, SNMP/sysDesc, CISCO/model

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/10/1992

Reference Information

CVE: CVE-1999-0162

BID: 315