CVE-2005-0612
CVSS7.5
发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:46:48
NMCO    

[原文]Cisco IP/VC Videoconferencing System 3510, 3520, 3525 and 3530 contain hard-coded default SNMP community strings, which allows remote attackers to gain access, cause a denial of service, and modify configuration.


[CNNVD]Cisco IP/VC存在默认SNMP公共串漏洞(CNNVD-200505-094)

        Cisco IP/VC存在固化的SNMP公共串,远程攻击者可以利用这个信息访问和控制设备。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:cisco:ipvc-3520-gw-2b2vCisco IPVC 3520-GW-2B2V
cpe:/h:cisco:ipvc-3520-gw-2bCisco IPVC 3520-GW-2B
cpe:/h:cisco:ipvc-3525-gw-1pCisco IPVC 3525-GW-1P
cpe:/h:cisco:ipvc-3510-mcuCisco IPVC 3510-MCU
cpe:/h:cisco:ipvc-3530-vtaCisco IPVC 3530-VTA
cpe:/h:cisco:ipvc-3520-gw-4vCisco IPVC 3520-GW-4B
cpe:/h:cisco:ipvc-3520-gw-2vCisco IPVC 3520-GW-2V

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0612
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0612
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-094
(官方数据源) CNNVD

- 其它链接及资源

http://www.cisco.com/public/technotes/cisco-sa-20050202-ipvc.shtml
(PATCH)  CISCO  20050202 Default SNMP Community Strings in Cisco IP/VC Products
http://secunia.com/advisories/14122
(PATCH)  SECUNIA  14122
http://www.securityfocus.com/bid/12424
(UNKNOWN)  BID  12424
http://securitytracker.com/id?1013067
(UNKNOWN)  SECTRACK  1013067

- 漏洞信息

Cisco IP/VC存在默认SNMP公共串漏洞
高危 设计错误
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        Cisco IP/VC存在固化的SNMP公共串,远程攻击者可以利用这个信息访问和控制设备。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.cisco.com/en/US/products/products_security_advisory09186a00803ca37f.shtml

- 漏洞信息

13442
Cisco IP/VC 3500 Series Default Hardcoded SNMP Community String
Remote / Network Access Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

Cisco IPVC 3500 Series contains a flaw that may allow a system compromise. The issue is triggered by default persistant SNMP community strings on the devices. It is possible that the flaw may allow a remote attacker to gain full control over the device, resulting in a loss of integrity.

- 时间线

2005-02-02 Unknow
2005-02-02 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): block and/or filter SNMP traffic on the switch port the vulnerable device is plugged into or at the nearest device closest to the vulnerable IPVC device.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站