Overview
A vulnerabilty in Cisco Catalyst Systems that have a Network Analysis Module (NAM) installed may allow a remote, unauthenticated attacker to gain complete control of this device.
Description
Cisco Catalyst 6000, 6500, and Cisco 7600 series switches may utilize Cisco's NAM to monitor and analyze network traffic using Management Information Bases (MIBs). Cisco Catalyst 6000, 6500 and Cisco 7600 series switches that have a NAM installed contain a vulnerability in the way SNMP packets are handled. According to Cisco Security Advisory: cisco-sa-20070228-nam: NAMs communicate with the Catalyst system by using the Simple Network Management Protocol (SNMP). By spoofing the SNMP communication between the Catalyst system and the NAM an attacker may obtain complete control of the Catalyst system. |
Impact
By successfully exploiting this vulnerability, an attacker may gain complete control of the device. |
Solution
Upgrade |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml
- http://www.cisco.com/en/US/products/hw/switches/ps708/products_module_configuration_guide_chapter09186a0080394e09.html
- http://www.cisco.com/warp/public/707/cisco-air-20070228-nam.shtml
- http://secunia.com/advisories/24344/
- http://securitytracker.com/alerts/2007/Feb/1017710.html
Acknowledgements
This vulnerabilty was reported in Cisco Security Advisory: cisco-sa-20070228-nam.
This document was written by Chris Taschner.
Other Information
CVE IDs: | None |
Severity Metric: | 9.37 |
Date Public: | 2007-02-28 |
Date First Published: | 2007-03-02 |
Date Last Updated: | 2007-03-22 18:22 UTC |
Document Revision: | 21 |