First published: Wed Jul 15 1998(Updated: )
By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX 501 | ||
Cisco PIX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1582 is rated as a moderate severity vulnerability due to the potential for unauthorized connections through misconfigured access controls.
To fix CVE-1999-1582, review and tighten the access control configurations on the Cisco PIX firewall to ensure they align with intended security policies.
CVE-1999-1582 affects all versions of the Cisco PIX firewall, including the Cisco PIX 501.
The impact of CVE-1999-1582 is that it allows unauthorized connections, potentially leading to data breaches if access controls are not properly managed.
A possible workaround for CVE-1999-1582 is to implement stricter access control lists that limit the scope of allowed connections.