Описание
Cisco PIX Firewall 6.0.3 and earlier, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack.
Ссылки
- Patch
- Patch
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.0\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:pix_firewall_software:6.1\(3\):*:*:*:*:*:*:*
EPSS
Процентиль: 67%
0.0055
Низкий
6.4 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Cisco PIX Firewall 6.0.3 and earlier, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack.
EPSS
Процентиль: 67%
0.0055
Низкий
6.4 Medium
CVSS2
Дефекты
NVD-CWE-Other