Vulnerability Details : CVE-2007-5571
Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536.
Products affected by CVE-2007-5571
- Cisco » Firewall Services ModuleVersions from including (>=) 3.1 and up to, including, (<=) 3.1\(6\)cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
- Cisco » Firewall Services ModuleVersions from including (>=) 3.2 and up to, including, (<=) 3.2\(2\)cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-5571
4.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-5571
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2007-5571
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-5571
-
http://www.vupen.com/english/advisories/2007/3530
Permissions Required
-
http://www.securityfocus.com/bid/26109
Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id?1018825
Third Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/37258
Third Party Advisory;VDB Entry
-
http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda61.shtml
Vendor Advisory
Jump to