5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.063 Low
EPSS
Percentile
93.7%
A vulnerability in Cisco’s Secure PIX Firewall may allow a remote attacker to reset arbitrary TCP sessions.
Cisco describes the Secure PIX Firewall as, “an easy-to-install, integrated hardware/software firewall appliance”. A vulnerability in the Secure PIX Firewall may allow a remote attacker to disrupt legitimate connections that have been established through the firewall. For more technical details, please see the Cisco Security Advisory Cisco Secure PIX Firewall TCP Reset Vulnerability.
A remote attacker can disrupt legitimate connections that have been established through the firewall.
Upgrade the software on the device as described in Cisco’s Security Advisory.
26825
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: August 21, 2003
Affected
<http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%2326825 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Cisco Systems Product Security Incident Response Team for reporting this vulnerability.
This document was written by Ian A Finlay.
CVE IDs: | CVE-2000-0613 |
---|---|
Severity Metric: | 4.18 Date Public: |