Vulnerability Description
By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Pix Firewall | All versions |
References
- http://www.cisco.com/warp/public/707/pixest-pub.shtml
- http://www.kb.cert.org/vuls/id/6733US Government Resource
- https://exchange.xforce.ibmcloud.com/vulnerabilities/8052
- http://www.cisco.com/warp/public/707/pixest-pub.shtml
- http://www.kb.cert.org/vuls/id/6733US Government Resource
- https://exchange.xforce.ibmcloud.com/vulnerabilities/8052
FAQ
What is CVE-1999-1582?
CVE-1999-1582 is a vulnerability with a CVSS score of 7.5 (HIGH). By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause ...
How severe is CVE-1999-1582?
CVE-1999-1582 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-1999-1582?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Pix Firewall.