A vulnerability in the H.323 application level gateway (ALG) used by the Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass the ALG. This vulnerability is due to insufficient data validation of traffic that is traversing the ALG. An attacker could exploit this vulnerability by sending crafted traffic to a targeted device. A successful exploit could allow the attacker to bypass the ALG and open connections that should not be allowed to a remote device located behind the ALG. Note: This vulnerability has been publicly discussed as NAT Slipstreaming.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 07 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: cisco
Published: 2021-09-23T02:30:50.538291Z
Updated: 2024-11-07T21:51:40.735Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1616
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-03T16:18:10.302Z
 NVD
                        NVD
                    Status : Modified
Published: 2021-09-23T03:15:12.627
Modified: 2024-11-21T05:44:44.827
Link: CVE-2021-1616
 Redhat
                        Redhat
                    No data.