7.5
CVSSv2

CVE-2001-1104

Published: 25/07/2001 Updated: 28/06/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote malicious users to spoof or hijack sessions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sonicwall soho_firmware 4.0.0

sonicwall soho_firmware 5.0.0

sonicwall soho_firmware 5.1.5.0

Exploits

source: wwwsecurityfocuscom/bid/670/info A vulnerability in the Linux kernel allows remote users to guess the initial sequence number of TCP sessions This can be used to create spoofed TCP sessions bypassing some types of IP based access controls The function 'secure_tcp_sequence_number' in the file 'drivers/char/randomc' at line 1684 ...