RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure.
References
Configurations
Configuration 1 (hide)
|
History
08 Nov 2021, 15:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:rsa:bsafe_ssl-j_sdk:3.1:*:*:*:*:*:*:* |
cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:* cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:* cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:* |
Information
Published : 2001-09-12 04:00
Updated : 2024-02-04 16:31
NVD link : CVE-2001-1105
Mitre link : CVE-2001-1105
CVE.ORG link : CVE-2001-1105
JSON object : View
Products Affected
cisco
- icdn
dell
- bsafe_ssl-j
CWE