ID

VAR-200305-0083


TITLE

Cisco IOS Crypto Engine Accelerator Access Control List Bypass Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2003-1388

DESCRIPTION

The Internet Operating System (IOS) is an operating system used on CISCO routers. The use of an access control list when the CISCO router enables the crypto engine accelerator allows unauthorized types of communication access, which can be exploited by remote attackers to bypass the access control list to access the protected network. If the CISCO router has the following configuration: crypto engine accelerator PPPoE dialer Ip route-cache Set the access control list on the external interface to allow only incoming ISAKMP and IPSEC communication, such as: ip access-list extended Block-Inbound-unwanted-Trafic permit udp 100.100. 100.0 0.0.0.255 host 102.168.1.2 eq isakmp permit esp 100.100. 100.0 0.0.0.255 host 102.168.1.2 deny ip any any log The IPSec communication will be parsed twice due to the incoming access control list, which will result in unauthorized communication access being protected. The internet. For example, ACLs allow internal networks to be exploited by attackers to inject fake packets into the network. However, if static encryption (crypto) mapping is used, this problem does not exist, so non-encrypted communication will be discarded when it is parsed by the ACL. In the case of dynamic encryption mapping, if an attacker wants to note that a forged packet bypasses the access list to access the network, it must control the neighbor router connected to the ACK interface to complete the attack

Trust: 0.81

sources: CNVD: CNVD-2003-1388 // BID: 7605

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2003-1388

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.2 tscope: - version: -

Trust: 1.8

vendor:ciscomodel:ios 12.2scope: - version: -

Trust: 1.8

vendor:ciscomodel:ios 12.2 sscope: - version: -

Trust: 1.5

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 bscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 xascope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 bxscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 bc1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 xhscope: - version: -

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2(1)

Trust: 0.3

vendor:ciscomodel:ios 12.2 mb3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bc1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xi2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xh3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 by2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xk2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xu2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xe3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 t1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xw1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.2 xb4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(3)

Trust: 0.3

vendor:ciscomodel:ios 12.2 xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(5)

Trust: 0.3

vendor:ciscomodel:ios 12.2piscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2pbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xs1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xm2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 t0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 b4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xl4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 dd3scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(1.1)

Trust: 0.3

vendor:ciscomodel:ios 12.2yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xt3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(7)

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mxscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(4)

Trust: 0.3

vendor:ciscomodel:ios 12.2dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xj1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xh2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xi1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 da1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xe2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 b3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 piscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 b2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 dxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ya1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 mx1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xa1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ca1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 b1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(12.05)

Trust: 0.3

vendor:ciscomodel:ios 12.2ddscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xb3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xgscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2003-1388 // BID: 7605

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2003-1388
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2003-1388
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2003-1388

THREAT TYPE

network

Trust: 0.3

sources: BID: 7605

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 7605

EXTERNAL IDS

db:BIDid:7605

Trust: 0.9

db:CNVDid:CNVD-2003-1388

Trust: 0.6

sources: CNVD: CNVD-2003-1388 // BID: 7605

REFERENCES

url:http://marc.theaimsgroup.com/?l=bugtraq&m=105295144304873&w=2

Trust: 0.6

url:/archive/1/321552

Trust: 0.3

url:/archive/1/321603

Trust: 0.3

url:/archive/1/321616

Trust: 0.3

sources: CNVD: CNVD-2003-1388 // BID: 7605

CREDITS

Discovery credited to Olivier <itsce.networkservices@pmintl.ch>.

Trust: 0.3

sources: BID: 7605

SOURCES

db:CNVDid:CNVD-2003-1388
db:BIDid:7605

LAST UPDATE DATE

2022-05-17T02:00:52.008000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2003-1388date:2014-01-20T00:00:00
db:BIDid:7605date:2003-05-14T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2003-1388date:2003-05-15T00:00:00
db:BIDid:7605date:2003-05-14T00:00:00