Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0613: Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows re

0
Medium
VulnerabilityCVE-2000-0613cve-2000-0613rce
Published: Mon Mar 20 2000 (03/20/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: pix_firewall

Description

Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections.

AI-Powered Analysis

AILast updated: 06/30/2025, 20:25:22 UTC

Technical Analysis

CVE-2000-0613 is a vulnerability affecting Cisco Secure PIX Firewall devices, where the firewall does not properly validate TCP Reset (RST) packets. TCP Reset packets are used in the TCP protocol to abruptly terminate a connection. In this vulnerability, an attacker can forge TCP RST packets and send them to the firewall, which mistakenly accepts these forged packets as legitimate. As a result, the firewall forcibly closes active, legitimate TCP connections passing through it. This flaw does not allow the attacker to gain unauthorized access or execute code, but it disrupts network communications by prematurely terminating sessions. The vulnerability is remotely exploitable without authentication or user interaction, and it affects the availability of network services protected by the PIX firewall. The CVSS v2 base score is 5.0 (medium severity), reflecting a network attack vector, low complexity, no authentication required, no impact on confidentiality or integrity, but partial impact on availability. No patches or fixes are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 2000), it primarily affects legacy PIX firewall devices that may still be in operation in some environments.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of critical network connections protected by Cisco PIX firewalls. This could lead to denial of service conditions for business-critical applications, impacting operational continuity and potentially causing financial losses or service degradation. Since the vulnerability only affects availability, confidentiality and integrity of data remain intact. However, organizations relying on PIX firewalls for perimeter defense may experience intermittent connectivity issues or forced session terminations, which could affect remote access, VPN tunnels, or internal communications. In sectors such as finance, healthcare, and critical infrastructure, even temporary network disruptions can have significant operational and reputational consequences. Additionally, the lack of available patches means organizations must rely on compensating controls or device replacement to mitigate risk.

Mitigation Recommendations

Given that no patches are available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Replace legacy Cisco PIX firewall devices with modern, supported firewall solutions that have updated security features and are actively maintained. 2) Implement network-level filtering to detect and block suspicious TCP RST packets, possibly using intrusion detection/prevention systems (IDS/IPS) that can identify forged resets based on anomaly detection or signature-based rules. 3) Employ TCP session hardening techniques such as TCP sequence number randomization or TCP RST validation mechanisms if supported by network devices to reduce the risk of accepting forged resets. 4) Monitor firewall logs and network traffic for unusual connection resets or patterns indicative of exploitation attempts. 5) Segment critical network assets to minimize the impact of forced connection terminations on essential services. 6) Educate network operations teams about this vulnerability to ensure rapid detection and response to potential incidents. These measures go beyond generic advice by focusing on compensating controls and device lifecycle management specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df919

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/30/2025, 8:25:22 PM

Last updated: 2/6/2026, 6:31:10 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats