CVE-2001-1105
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/09/2001
Last modified:
03/04/2025
Description
RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:icdn:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.ciac.org/ciac/bulletins/l-141.shtml
- http://www.cisco.com/warp/public/707/SSL-J-pub.html
- http://www.rsasecurity.com/products/bsafe/bulletins/BSAFE_SSL-J_3.x.SecurityBulletin.html
- http://www.securityfocus.com/bid/3329
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7112
- http://www.ciac.org/ciac/bulletins/l-141.shtml
- http://www.cisco.com/warp/public/707/SSL-J-pub.html
- http://www.rsasecurity.com/products/bsafe/bulletins/BSAFE_SSL-J_3.x.SecurityBulletin.html
- http://www.securityfocus.com/bid/3329
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7112