ID

VAR-200212-0088


CVE

CVE-2002-2139


TITLE

Cisco PIX Firewall of ISAKMP SA Session hijack vulnerability due to improper handling

Trust: 0.8

sources: JVNDB: JVNDB-2002-000284

DESCRIPTION

Cisco PIX Firewall 6.0.3 and earlier, and 6.1.x to 6.1.3, do not delete the duplicate ISAKMP SAs for a user's VPN session, which allows local users to hijack a session via a man-in-the-middle attack. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. By exploiting this issue, a remote attacker can gain access to legitimate users. IP Get the address, PIX * Firewall It is possible to avoid authentication. For this attack to succeed, the attacker must use the pre-shared key required for authentication. (group pre-shared key) Or you need to get a group password.Please refer to the “Overview” for the impact of this vulnerability. PIX is the firewall system/firmware combination distributed and maintained by Cisco Systems. A vulnerability has been discovered in the handling of VPN sessions by PIX firewalls. When processing initial contact notify messages, PIX does not remove duplicate peer-to-peer ISAKMP SAs. When a user establishes a VPN session during peer user authentication, the PIX creates a KSAKMP SA associated with the user and his IP address. If an attacker can prevent a logged-in user from connecting, and use the same IP address as that user to connect to the PIX, the attacker can successfully establish a VPN session through the PIX and gain unauthorized access to the internal network. CISCO designated this vulnerability BUG ID as: CSCdv83490

Trust: 1.98

sources: NVD: CVE-2002-2139 // JVNDB: JVNDB-2002-000284 // BID: 6211 // VULHUB: VHN-6522

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewallscope:eqversion:6.1

Trust: 1.7

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 1.7

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:6.0\(1\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.0\(3\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.1\(3\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.1\(2\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.0\(2\)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0.4

Trust: 0.3

sources: BID: 6211 // JVNDB: JVNDB-2002-000284 // CNNVD: CNNVD-200212-577 // NVD: CVE-2002-2139

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-2139
value: MEDIUM

Trust: 1.0

NVD: CVE-2002-2139
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200212-577
value: MEDIUM

Trust: 0.6

VULHUB: VHN-6522
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-2139
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-6522
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-6522 // JVNDB: JVNDB-2002-000284 // CNNVD: CNNVD-200212-577 // NVD: CVE-2002-2139

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-2139

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200212-577

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200212-577

CONFIGURATIONS

sources: JVNDB: JVNDB-2002-000284

PATCH

title:pix-multiple-vuln-puburl:http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml

Trust: 0.8

title:pix-multiple-vuln-puburl:http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/pix-multiple-vuln-pub-j.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2002-000284

EXTERNAL IDS

db:BIDid:6211

Trust: 2.8

db:NVDid:CVE-2002-2139

Trust: 2.5

db:JVNDBid:JVNDB-2002-000284

Trust: 0.8

db:CNNVDid:CNNVD-200212-577

Trust: 0.7

db:XFid:10660

Trust: 0.6

db:CIACid:N-017

Trust: 0.6

db:CISCOid:20021120 CISCO PIX MULTIPLE VULNERABILITIES

Trust: 0.6

db:NSFOCUSid:3872

Trust: 0.6

db:VULHUBid:VHN-6522

Trust: 0.1

sources: VULHUB: VHN-6522 // BID: 6211 // JVNDB: JVNDB-2002-000284 // CNNVD: CNNVD-200212-577 // NVD: CVE-2002-2139

REFERENCES

url:http://www.securityfocus.com/bid/6211

Trust: 2.5

url:http://www.cisco.com/warp/public/707/pix-multiple-vuln-pub.shtml

Trust: 2.0

url:http://www.ciac.org/ciac/bulletins/n-017.shtml

Trust: 1.7

url:http://www.iss.net/security_center/static/10660.php

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-2139

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-2139

Trust: 0.8

url:http://www.nsfocus.net/vulndb/3872

Trust: 0.6

sources: VULHUB: VHN-6522 // BID: 6211 // JVNDB: JVNDB-2002-000284 // CNNVD: CNNVD-200212-577 // NVD: CVE-2002-2139

CREDITS

Cisco PSIRT※ psirt@cisco.com

Trust: 0.6

sources: CNNVD: CNNVD-200212-577

SOURCES

db:VULHUBid:VHN-6522
db:BIDid:6211
db:JVNDBid:JVNDB-2002-000284
db:CNNVDid:CNNVD-200212-577
db:NVDid:CVE-2002-2139

LAST UPDATE DATE

2024-08-14T14:29:35.919000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-6522date:2018-10-30T00:00:00
db:BIDid:6211date:2002-11-20T00:00:00
db:JVNDBid:JVNDB-2002-000284date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-577date:2006-01-27T00:00:00
db:NVDid:CVE-2002-2139date:2018-10-30T16:26:18.013

SOURCES RELEASE DATE

db:VULHUBid:VHN-6522date:2002-12-31T00:00:00
db:BIDid:6211date:2002-11-20T00:00:00
db:JVNDBid:JVNDB-2002-000284date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-577date:2002-11-20T00:00:00
db:NVDid:CVE-2002-2139date:2002-12-31T05:00:00