VYPR
Unrated severityNVD Advisory· Published Dec 31, 2001· Updated Apr 16, 2026

CVE-2001-1548

CVE-2001-1548

Description

ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.

Affected products

8
  • cpe:2.3:a:zonelabs:zonealarm:2.1:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:a:zonelabs:zonealarm:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:zonelabs:zonealarm:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:zonelabs:zonealarm:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:zonelabs:zonealarm:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:zonelabs:zonealarm:2.4:*:pro:*:*:*:*:*
    • cpe:2.3:a:zonelabs:zonealarm:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:zonelabs:zonealarm:2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:zonelabs:zonealarm:2.6:*:pro:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.