Vulnerability Details : CVE-2001-1105
RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure.
Exploit prediction scoring system (EPSS) score for CVE-2001-1105
Probability of exploitation activity in the next 30 days: 0.45%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1105
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2001-1105
-
http://www.ciac.org/ciac/bulletins/l-141.shtml
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/7112
-
http://www.cisco.com/warp/public/707/SSL-J-pub.html
-
http://www.rsasecurity.com/products/bsafe/bulletins/BSAFE_SSL-J_3.x.SecurityBulletin.html
-
http://www.securityfocus.com/bid/3329
Patch;Vendor Advisory
Products affected by CVE-2001-1105
- cpe:2.3:a:cisco:icdn:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*