Cisco IOS TCP Sequence Prediction Connection Hijacking (CSCds04747)

high Nessus Plugin ID 10976


The remote device is missing a vendor-supplied security patch.


Cisco IOS Software contains a flaw that permits the successful prediction of TCP Initial Sequence Numbers.

This vulnerability is present in all released versions of Cisco IOS software running on Cisco routers and switches. It only affects the security of TCP connections that originate or terminate on the affected Cisco device itself; it does not apply to TCP traffic forwarded through the affected device in transit between two other hosts.

This vulnerability is documented as Cisco bug ID CSCds04747.


Plugin Details

Severity: High

ID: 10976

File Name: CSCds04747.nasl

Version: 1.26

Type: local

Family: CISCO

Published: 6/5/2002

Updated: 3/27/2020

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.6


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/sysDesc, SNMP/community, CISCO/model

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/1/1995

Reference Information

CVE: CVE-2001-0288, CVE-2001-0328

BID: 2682