First published: Fri Oct 04 2002(Updated: )
Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, allows remote attackers to obtain potentially sensitive information without authentication by directly accessing certain HTML pages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco VPN 3000 concentrator series software | =2.0 | |
Cisco VPN 3000 concentrator series software | =2.5.2.a | |
Cisco VPN 3000 concentrator series software | =2.5.2.b | |
Cisco VPN 3000 concentrator series software | =2.5.2.c | |
Cisco VPN 3000 concentrator series software | =2.5.2.d | |
Cisco VPN 3000 concentrator series software | =2.5.2.f | |
Cisco VPN 3000 concentrator series software | =3.0 | |
Cisco VPN 3000 concentrator series software | =3.0\(rel\) | |
Cisco VPN 3000 concentrator series software | =3.0.3.a | |
Cisco VPN 3000 concentrator series software | =3.0.3.b | |
Cisco VPN 3000 concentrator series software | =3.0.4 | |
Cisco VPN 3000 concentrator series software | =3.1 | |
Cisco VPN 3000 concentrator series software | =3.1\(rel\) | |
Cisco VPN 3000 concentrator series software | =3.1.1 | |
Cisco VPN 3000 concentrator series software | =3.1.2 | |
Cisco VPN 3000 concentrator series software | =3.1.4 | |
Cisco VPN 3000 concentrator series software | =3.5\(rel\) | |
Cisco VPN 3000 concentrator series software | =3.5.1 | |
Cisco VPN 3000 concentrator series software | =3.5.2 | |
Cisco VPN 3002 Hardware Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1099 is considered a high severity vulnerability as it allows remote attackers to access potentially sensitive information without authentication.
To mitigate CVE-2002-1099, upgrade the Cisco VPN 3000 Concentrator to version 3.5.3 or later.
CVE-2002-1099 affects Cisco VPN 3000 Concentrator versions 2.2.x and 3.x prior to 3.5.3.
Yes, CVE-2002-1099 can lead to data leakage as it allows unauthorized access to sensitive HTML pages.
CVE-2002-1099 enables an information disclosure attack where attackers can retrieve sensitive information without authentication.