First published: Wed Sep 12 2001(Updated: )
RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Icdn | =2.0 | |
EMC RSA BSAFE SSL-J | =3.0 | |
EMC RSA BSAFE SSL-J | =3.0.1 | |
EMC RSA BSAFE SSL-J | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1105 is considered to be a high severity vulnerability due to the potential for unauthorized access to sensitive data.
To fix CVE-2001-1105, update to the latest version of the affected software which addresses this vulnerability.
CVE-2001-1105 affects Cisco iCND 2.0 and Dell BSAFE SSL-J versions 3.0, 3.0.1, and 3.1.
The vulnerability in CVE-2001-1105 involves improper caching of session IDs from failed login attempts, enabling potential unauthorized access.
Yes, CVE-2001-1105 can be exploited remotely by attackers who can bypass SSL client authentication.