First published: Fri Oct 04 2002(Updated: )
Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the concentrator.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco VPN 3000 concentrator series software | =2.0 | |
Cisco VPN 3000 concentrator series software | =2.5.2.a | |
Cisco VPN 3000 concentrator series software | =2.5.2.b | |
Cisco VPN 3000 concentrator series software | =2.5.2.c | |
Cisco VPN 3000 concentrator series software | =2.5.2.d | |
Cisco VPN 3000 concentrator series software | =2.5.2.f | |
Cisco VPN 3000 concentrator series software | =3.0 | |
Cisco VPN 3000 concentrator series software | =3.0\(rel\) | |
Cisco VPN 3000 concentrator series software | =3.0.3.a | |
Cisco VPN 3000 concentrator series software | =3.0.3.b | |
Cisco VPN 3000 concentrator series software | =3.0.4 | |
Cisco VPN 3000 concentrator series software | =3.1 | |
Cisco VPN 3000 concentrator series software | =3.1\(rel\) | |
Cisco VPN 3000 concentrator series software | =3.1.1 | |
Cisco VPN 3000 concentrator series software | =3.1.2 | |
Cisco VPN 3000 concentrator series software | =3.1.4 | |
Cisco VPN 3000 concentrator series software | =3.5\(rel\) | |
Cisco VPN 3000 concentrator series software | =3.5.1 | |
Cisco VPN 3000 concentrator series software | =3.5.2 | |
Cisco VPN 3002 Hardware Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1098 is classified as a significant vulnerability that may allow arbitrary traffic through affected Cisco VPN 3000 Concentrators.
To address CVE-2002-1098, upgrade the Cisco VPN 3000 Concentrator to version 3.5.3 or later.
CVE-2002-1098 affects multiple versions of Cisco VPN 3000 Concentrator software, specifically versions 2.2.x and 3.x prior to 3.5.3.
The impact of CVE-2002-1098 includes the possibility of unauthorized access as arbitrary traffic can bypass the intended filtering.
There is no widely recommended workaround for CVE-2002-1098; the best action is to apply patches and updates as they become available.