Cisco IOS ACL Bypass (Bug ID CSCdi34061)

medium Nessus Network Monitor Plugin ID 2196

Synopsis

The remote host may allow unauthorized traffic to pass, despite configured access controls.

Description

The remote system seems to be vulnerable to a flaw in IOS when the keyword 'established' is being used in the ACLs. This bug can, under very specific circumstances and only with certain IP host implementations, allow unauthorized packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID CSCdi34061.

Solution

http://www.cisco.com/warp/public/707/2.html

Plugin Details

Severity: Medium

ID: 2196

Family: SNMP

Published: 9/3/2004

Updated: 3/6/2019

Nessus ID: 10973

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/o:cisco:ios

Reference Information

CVE: CVE-1999-0162

BID: 315