Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CISCO >> CSCdea77143, CSCdz15393, CSCdt84906


Vulnerability Assessment Details

CSCdea77143, CSCdz15393, CSCdt84906

Vulnerability Assessment Summary
Uses SNMP to determine if a flaw is present

Detailed Explanation for this Vulnerability Assessment


The remote Cisco VPN 3000 concentrator is vulnerable to various flaws
which may permit a possible hacker to use this device
to break into a VPN, disable the remote device by sending
a malformed SSH initialization packet or disable the
remote device by sending a flood of malformed ICMP packets.

This vulnerability is documented with the CISCO
bugs ID CSCdea77143, CSCdz15393 and CSCdt84906

Solution : http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml
Network Security Threat Level: High

*** As Nessus solely relied on the banner of the remote host
*** this might be a false positive


Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2003 Renaud Deraison

Cables, Connectors

WatchGuard T1AE8 Firebox X 8 Port Firewall
$99.99
WatchGuard T1AE8 Firebox X 8 Port Firewall pictureJuniper Networks SRX-210 Firewall}
$39.89
Juniper Networks SRX-210 Firewall} pictureCisco ASA5550-BUN-K9 Firewall VPN Premium 4GBDRAM/256F w/ SSM-4GE-INC Wrong Face
$600.0
Cisco ASA5550-BUN-K9 Firewall VPN Premium 4GBDRAM/256F w/ SSM-4GE-INC Wrong Face pictureNetgear FVS318 ProSafe 8-Port VPN Firewall
$0.99
Netgear FVS318 ProSafe 8-Port VPN Firewall picture


Discussions

No Discussions have been posted on this vulnerability.