Unrated severityNVD Advisory· Published Dec 31, 2001· Updated Apr 16, 2026
CVE-2001-1548
CVE-2001-1548
Description
ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Affected products
8cpe:2.3:a:zonelabs:zonealarm:2.1:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:zonelabs:zonealarm:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:zonelabs:zonealarm:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:zonelabs:zonealarm:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:zonelabs:zonealarm:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:zonelabs:zonealarm:2.4:*:pro:*:*:*:*:*
- cpe:2.3:a:zonelabs:zonealarm:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:zonelabs:zonealarm:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:zonelabs:zonealarm:2.6:*:pro:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.