Unrated severityNVD Advisory· Published Sep 21, 2006· Updated Apr 16, 2026
CVE-2006-4911
CVE-2006-4911
Description
Unspecified vulnerability in Cisco IPS 5.0 before 5.0(6p2) and 5.1 before 5.1(2), when running in inline or promiscuous mode, allows remote attackers to bypass traffic inspection via a "crafted sequence of fragmented IP packets".
Affected products
1- cpe:2.3:a:cisco:ips_sensor_software:*:*:*:*:*:*:*:*Range: >=5.0,<5.0\(6p2\)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/22022nvdThird Party Advisory
- securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtmlnvdVendor Advisory
- www.kb.cert.org/vuls/id/658884nvdThird Party AdvisoryUS Government Resource
- www.securityfocus.com/bid/20127nvdThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/29058nvdThird Party AdvisoryVDB Entry
- www.osvdb.org/29036nvdBroken Link
- www.vupen.com/english/advisories/2006/3721nvdPermissions Required
News mentions
0No linked articles in our index yet.