Vulnerability Details : CVE-2002-1108
Cisco Virtual Private Network (VPN) Client software 2.x.x, and 3.x before 3.6(Rel), when configured with all tunnel mode, can be forced into acknowledging a TCP packet from outside the tunnel.
Products affected by CVE-2002-1108
- cpe:2.3:a:cisco:vpn_client:3.5.1:*:linux:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:3.5.1:*:mac_os_x:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:3.5.1:*:solaris:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:3.5.1:*:windows:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:2.0:*:windows:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:3.0:*:windows:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:3.1:*:windows:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:3.0.5:*:windows:*:*:*:*:*
- cpe:2.3:a:cisco:vpn_client:3.5.1c:*:windows:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1108
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1108
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2002-1108
Jump to