First published: Thu May 03 2001(Updated: )
Cisco switches and routers running IOS 12.1 and earlier produce predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | <=12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0288 is considered a medium severity vulnerability due to its potential for TCP connection spoofing.
To mitigate CVE-2001-0288, upgrade to a Cisco IOS version later than 12.1 that generates random TCP Initial Sequence Numbers.
CVE-2001-0288 affects Cisco switches and routers running IOS versions 12.1 and earlier.
Yes, CVE-2001-0288 can be exploited remotely by attackers able to spoof TCP connections.
CVE-2001-0288 involves predictable TCP Initial Sequence Numbers, allowing for potential connection hijacking.