First published: Mon Dec 11 2000(Updated: )
The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX Firewall | =5.2 | |
Cisco PIX Firewall | =4.3 | |
Cisco PIX Firewall | =4.2\(1\) | |
Cisco PIX Firewall | =4.4\(4\) | |
Cisco PIX Firewall | =5.1 | |
Cisco PIX Firewall | =4.2\(5\) | |
Cisco PIX Firewall | =4.2\(2\) | |
Cisco PIX Firewall | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1022 is considered a critical vulnerability that could allow remote attackers to execute restricted SMTP commands.
To fix CVE-2000-1022, upgrade the Cisco Secure PIX Firewall to a version later than 5.2(2) or apply the recommended patches.
CVE-2000-1022 affects Cisco PIX Firewall versions 5.2(2) and earlier, including multiple earlier 4.x releases.
Exploiting CVE-2000-1022 allows attackers to gain unauthorized access to features of the firewall by bypassing command restrictions.
If you cannot upgrade, implement strict network controls and monitor traffic to the SMTP service to reduce exposure to CVE-2000-1022.