CVE-2007-1257
Published Mar 3, 2007
Last updated 7 years ago
Overview
- Description
- The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Evaluator
- Comment
- Per: http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml#@ID "Only Cisco Catalyst systems that have a NAM on them are affected. This vulnerability affects systems that run Internetwork Operating System (IOS) or Catalyst Operating System (CatOS). "
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:network_analysis_module:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD82BCCE-F68A-48A5-B484-98D9C3024E3A" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0" } ], "operator": "OR" } ] } ]