First published: Thu Aug 17 2006(Updated: )
** DISPUTED ** Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX | ||
Cisco PIX | ||
Cisco PIX Firewall | ||
Cisco PIX Firewall | ||
Cisco PIX | ||
Cisco PIX | ||
Cisco PIX Firewall | ||
Cisco PIX Firewall | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-4194 is considered to be high due to the potential for remote exploitation.
To fix CVE-2006-4194, it is recommended to apply any relevant updates or patches provided by Cisco for affected PIX Firewall models.
CVE-2006-4194 affects various models of Cisco PIX 500 Series Security Appliances, including the 501, 506, 515, 520, and 525.
Yes, CVE-2006-4194 can be exploited remotely by attackers who can send arbitrary UDP packets to intranet devices.
CVE-2006-4194 involves the sending of arbitrary UDP packets via unspecified vectors related to SIP fixup commands.