ID

VAR-200111-0036


CVE

CVE-2001-0929


TITLE

Cisco IOS Firewall Feature Set fails to check IP protocol type thereby allowing packets to bypass dynamic access control lists

Trust: 0.8

sources: CERT/CC: VU#362483

DESCRIPTION

Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. IOS is a Cisco Internetwork Operating System. It is maintained and distributed by Cisco, and used on various types of Cisco hardware. A problem has been found in the checking of protocol by the system. The vulnerable version of IOS does not check the protocol type of the packets, thus making it possible for a system on either end of the connection to send data of a different type. One such instance would be a system on the protected network sending a UDP packet to a system outside of the protected network, and the external system returning a connection to the host via TCP using the pre-established IP address and port numbers. This could allow a remote user to gather intelligence about a host, and potentially lead to an organized attack against network resources. A remote attacker could exploit this vulnerability to bypass access control lists

Trust: 1.98

sources: NVD: CVE-2001-0929 // CERT/CC: VU#362483 // BID: 3588 // VULHUB: VHN-3736

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 1.9

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.9

vendor:ciscomodel:iosscope:eqversion:11.2p

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:11.3t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1e

Trust: 1.6

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:ios 12.2 tscope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.1 escope:neversion: -

Trust: 0.6

vendor:ciscomodel:ios 12.0xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(6)

Trust: 0.3

vendor:ciscomodel:ios 12.1xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.1(12)

Trust: 0.3

vendor:ciscomodel:ios 12.2 xj1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.0(21)

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.1(11.1)

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0xv

Trust: 0.3

vendor:ciscomodel:ios 11.2pscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yb5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.0(20.3)

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ye4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xq2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xi1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yc2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ddscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xk5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 xm6scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yf3scope:neversion: -

Trust: 0.3

sources: CERT/CC: VU#362483 // BID: 3588 // CNNVD: CNNVD-200111-047 // NVD: CVE-2001-0929

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0929
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#362483
value: 14.06

Trust: 0.8

CNNVD: CNNVD-200111-047
value: HIGH

Trust: 0.6

VULHUB: VHN-3736
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2001-0929
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3736
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#362483 // VULHUB: VHN-3736 // CNNVD: CNNVD-200111-047 // NVD: CVE-2001-0929

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0929

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200111-047

TYPE

Design Error

Trust: 0.9

sources: BID: 3588 // CNNVD: CNNVD-200111-047

EXTERNAL IDS

db:BIDid:3588

Trust: 2.8

db:CERT/CCid:VU#362483

Trust: 2.5

db:NVDid:CVE-2001-0929

Trust: 2.0

db:OSVDBid:808

Trust: 1.7

db:CNNVDid:CNNVD-200111-047

Trust: 0.7

db:CISCOid:20011128 A VULNERABILITY IN IOS FIREWALL FEATURE SET

Trust: 0.6

db:XFid:7614

Trust: 0.6

db:VULHUBid:VHN-3736

Trust: 0.1

sources: CERT/CC: VU#362483 // VULHUB: VHN-3736 // BID: 3588 // CNNVD: CNNVD-200111-047 // NVD: CVE-2001-0929

REFERENCES

url:http://www.cisco.com/warp/public/707/ios-cbac-dynacl-pub.shtml

Trust: 2.8

url:http://www.securityfocus.com/bid/3588

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/362483

Trust: 1.7

url:http://www.osvdb.org/808

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/7614

Trust: 1.1

url:http://www.cisco.com/warp/public/707/cisco-sn-20040326-exploits.shtml

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/7614

Trust: 0.6

sources: CERT/CC: VU#362483 // VULHUB: VHN-3736 // BID: 3588 // CNNVD: CNNVD-200111-047 // NVD: CVE-2001-0929

CREDITS

This vulnerability was announced in a Cisco Security Advisory on November 28, 2001.

Trust: 0.9

sources: BID: 3588 // CNNVD: CNNVD-200111-047

SOURCES

db:CERT/CCid:VU#362483
db:VULHUBid:VHN-3736
db:BIDid:3588
db:CNNVDid:CNNVD-200111-047
db:NVDid:CVE-2001-0929

LAST UPDATE DATE

2025-04-03T22:14:14.774000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#362483date:2004-03-30T00:00:00
db:VULHUBid:VHN-3736date:2017-10-10T00:00:00
db:BIDid:3588date:2006-07-13T20:13:00
db:CNNVDid:CNNVD-200111-047date:2005-05-02T00:00:00
db:NVDid:CVE-2001-0929date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#362483date:2001-11-28T00:00:00
db:VULHUBid:VHN-3736date:2001-11-28T00:00:00
db:BIDid:3588date:2001-11-28T00:00:00
db:CNNVDid:CNNVD-200111-047date:2001-11-28T00:00:00
db:NVDid:CVE-2001-0929date:2001-11-28T05:00:00