First published: Wed Nov 28 2001(Updated: )
Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.1e | |
Cisco IOS | =12.1t | |
Cisco IOS | =12.2t | |
Cisco IOS | =12.0t | |
Cisco IOS | =11.2p | |
Cisco IOS | =12.1 | |
Cisco IOS | =11.3t | |
Cisco IOS | =12.2 | |
Cisco IOS | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0929 is classified as a high-severity vulnerability due to its potential to allow remote attackers to bypass access control lists.
To mitigate CVE-2001-0929, upgrade to a patched version of Cisco IOS that addresses the IP protocol type checking issue.
CVE-2001-0929 affects Cisco IOS versions 11.2P through 12.2T.
CVE-2001-0929 could allow unauthorized access to network resources by bypassing configured access control lists.
CVE-2001-0929 remains relevant for organizations using unsupported or outdated versions of Cisco IOS that may still be in operation.