First published: Tue Dec 31 2002(Updated: )
Cisco PIX Firewall 6.0.3 and earlier, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX Firewall | =6.0 | |
Cisco PIX Firewall | =6.0\(1\) | |
Cisco PIX Firewall | =6.0\(2\) | |
Cisco PIX Firewall | =6.0\(3\) | |
Cisco PIX Firewall | =6.1 | |
Cisco PIX Firewall | =6.1\(2\) | |
Cisco PIX Firewall | =6.1\(3\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2139 has a medium severity rating, indicating a moderate level of risk in terms of potential exploitation.
To fix CVE-2002-2139, upgrade the Cisco PIX Firewall to the latest version that addresses this vulnerability.
CVE-2002-2139 affects Cisco PIX Firewall software versions 6.0.3 and earlier, as well as versions 6.1.x up to 6.1.3.
CVE-2002-2139 is associated with a man-in-the-middle attack, which allows unauthorized session hijacking.
Local users with access to the network can exploit CVE-2002-2139 to hijack VPN sessions.