First published: Wed Jul 25 2001(Updated: )
SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote attackers to spoof or hijack sessions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sonicwall Soho Firmware | =4.0.0 | |
SonicWALL SOHO | ||
Sonicwall Soho Firmware | =5.0.0 | |
Sonicwall Soho Firmware | =5.1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1104 is classified as a medium severity vulnerability that allows attackers to spoof or hijack sessions.
To fix CVE-2001-1104, upgrade the SonicWALL SOHO firmware to a version later than 5.1.5.0 that addresses the predictable TCP sequence number issue.
CVE-2001-1104 affects SonicWALL SOHO firmware versions 4.0.0 and 5.0.0.
Yes, CVE-2001-1104 can be exploited remotely by attackers to spoof or hijack active sessions.
CVE-2001-1104 is a TCP sequence number prediction vulnerability.