Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2001-0328Reliance on Security Through Obscurity in Cisco IOS

Severity
5.0MEDIUMNVD
EPSS
28.6%
top 3.45%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 27
Latest updateMay 3

Description

TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages1 packages

ciscocisco/ios

Patches

🔴Vulnerability Details

1
GHSA
GHSA-jvrp-wcjq-4xx5: TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruptio2022-05-03

💥Exploits & PoCs

1
Exploit-DB
Linux Kernel 2.2 - Predictable TCP Initial Sequence Number1999-09-27

📋Vendor Advisories

3
Red Hat
kernel: TCP connection ISN hijacks2001-05-01
Cisco
Cisco IOS Software TCP Initial Sequence Number Randomization Improvements2001-03-01
Cisco
Cisco IOS Software TCP Initial Sequence Number Randomization Improvements

📐Framework References

2
CWE
Reliance on Security Through Obscurity
CWE
Violation of Secure Design Principles

💬Community

1
Bugzilla
CVE-2001-0328 kernel: TCP connection ISN hijacks2013-05-16
CVE-2001-0328 — Reliance on Security Through Obscurity | cvebase