First published: Mon Mar 20 2000(Updated: )
Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX 501 | ||
Cisco PIX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0613 has a high severity rating as it allows attackers to disrupt legitimate connections on the Cisco Secure PIX Firewall.
The implications of CVE-2000-0613 include potential service disruptions and loss of connectivity for affected users due to forged TCP Reset packets.
To fix CVE-2000-0613, it is recommended to update to a version of Cisco PIX Firewall that addresses this vulnerability.
CVE-2000-0613 affects Cisco PIX Firewall devices, including the Cisco PIX 501.
Yes, CVE-2000-0613 can be exploited remotely by attackers who send forged TCP Reset packets.