ID

VAR-200210-0273


CVE

CVE-2002-1102


TITLE

Cisco VPN 3000 Concentrator LAN-to-LAN IPSEC capability Denial of service vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200210-066

DESCRIPTION

The LAN-to-LAN IPSEC capability for Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.4, allows remote attackers to cause a denial of service via an incoming LAN-to-LAN connection with an existing security association with another device on the remote network, which causes the concentrator to remove the previous connection. Cisco has reported a security vulnerability in VPN 3000 series concentrator devices. The vulnerability is related to handling of incoming LAN-to-LAN IPSEC tunnel connections. According to Cisco, this behaviour may be exploitable as a denial of service attack. Furthermore, affected devices do not ensure that the data transmitted across a LAN-to-LAN IPSEC tunnel is sourced from the appropriate network. The implications of this potentially separate issue are not yet known. There are loopholes in the LAN-to-LAN IPSEC capability of Cisco VPN 3000 Concentrator 2.2.x and versions 3.x before 3.5.4

Trust: 1.26

sources: NVD: CVE-2002-1102 // BID: 5622 // VULHUB: VHN-5490

AFFECTED PRODUCTS

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.5.2

Trust: 1.5

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.a

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0.3.b

Trust: 1.0

vendor:ciscomodel:vpn 3002 hardware clientscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.b

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0.4

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0\(rel\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0.3.a

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.c

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.d

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1.2

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1.4

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5\(rel\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.f

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1\(rel\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.3

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.2

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.3

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.1

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.1.1

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.0.3.a

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.1.2

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.5.3

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.1\(rel\)

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.5\(rel\)

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.5.1

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.5.2

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:3.0.3.b

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.3

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:neversion:30003.5.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:neversion:30003.6

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:neversion:30003.5.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.2

Trust: 0.3

vendor:ciscomodel:vpn hardware clientscope:eqversion:3002

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:neversion:30003.6.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.1

Trust: 0.3

sources: BID: 5622 // CNNVD: CNNVD-200210-066 // NVD: CVE-2002-1102

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-1102
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200210-066
value: MEDIUM

Trust: 0.6

VULHUB: VHN-5490
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-1102
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-5490
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-5490 // CNNVD: CNNVD-200210-066 // NVD: CVE-2002-1102

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-1102

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200210-066

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200210-066

EXTERNAL IDS

db:BIDid:5622

Trust: 2.0

db:NVDid:CVE-2002-1102

Trust: 1.7

db:CISCOid:20020903 CISCO VPN 3000 CONCENTRATOR MULTIPLE VULNERABILITIES

Trust: 0.6

db:XFid:10027

Trust: 0.6

db:CNNVDid:CNNVD-200210-066

Trust: 0.6

db:VULHUBid:VHN-5490

Trust: 0.1

sources: VULHUB: VHN-5490 // BID: 5622 // CNNVD: CNNVD-200210-066 // NVD: CVE-2002-1102

REFERENCES

url:http://www.securityfocus.com/bid/5622

Trust: 1.7

url:http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/10027

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/10027

Trust: 0.6

sources: VULHUB: VHN-5490 // CNNVD: CNNVD-200210-066 // NVD: CVE-2002-1102

CREDITS

Vulnerability announced in a Cisco Security Advisory.

Trust: 0.3

sources: BID: 5622

SOURCES

db:VULHUBid:VHN-5490
db:BIDid:5622
db:CNNVDid:CNNVD-200210-066
db:NVDid:CVE-2002-1102

LAST UPDATE DATE

2024-08-14T14:16:19.285000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-5490date:2018-10-30T00:00:00
db:BIDid:5622date:2002-09-03T00:00:00
db:CNNVDid:CNNVD-200210-066date:2005-05-13T00:00:00
db:NVDid:CVE-2002-1102date:2018-10-30T16:26:19.107

SOURCES RELEASE DATE

db:VULHUBid:VHN-5490date:2002-10-04T00:00:00
db:BIDid:5622date:2002-09-03T00:00:00
db:CNNVDid:CNNVD-200210-066date:2002-10-04T00:00:00
db:NVDid:CVE-2002-1102date:2002-10-04T04:00:00