CVE-2009-0624
Published Feb 26, 2009
Last updated 16 years ago
Overview
- Description
- Unspecified vulnerability in the SNMPv2c implementation in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv1 packet.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml "Note: SNMPv2c must be explicitly configured in an affected device in order to process any SNMPv2c transactions. SNMPv2c is not enabled by default."
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:application_control_engine_module:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B8CC891-D31C-44D2-BB76-F5ADE15D767C", "versionEndIncluding": "1.2" }, { "criteria": "cpe:2.3:h:cisco:application_control_engine_module:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2258512F-36CD-48FF-AAB3-32D6A63959D7" }, { "criteria": "cpe:2.3:h:cisco:application_control_engine_module:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1331F98-6AB3-4285-BF6E-4DEAADE069D1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE398278-79E8-4043-9ED3-735775213587", "versionEndIncluding": "a3\\(2.0\\)" }, { "criteria": "cpe:2.3:h:cisco:ace_4710:a1\\(2.0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "142B1472-4694-436F-85C0-52B6A9CFCA64" }, { "criteria": "cpe:2.3:h:cisco:ace_4710:a1\\(8.0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A421567F-1772-46DC-9FBA-E0072DC6B7C6" }, { "criteria": "cpe:2.3:h:cisco:ace_4710:a3\\(1.0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F3BDA08-1786-46AD-93B3-C374BE1AC949" } ], "operator": "OR" } ] } ]