Lucene search

K
certCERTVU:403315
HistoryMay 16, 2002 - 12:00 a.m.

Nortel Networks CVX 1800 discloses privileged information

2002-05-1600:00:00
www.kb.cert.org
16

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.062 Low

EPSS

Percentile

93.6%

Overview

The Nortel Networks CVX 1800 Multi-Service Access Switch discloses privileged information.

Description

The CVX 1800 Multi-Service Access Switch is a large modem bank typically used by large carriers and ISP’s. When the CVX 1800 is queried with a specially crafted snmpwalk, it will respond with all usernames and passwords for administrator accounts on the vulnerable CVX 1800.


Impact

An attacker can gain access to sensitive information such as administrator usernames and passwords. The attacker could then use this information to make unauthorized configuration changes to the CVX 1800.


Solution

Upgrade the software on the CVX 1800 to 3.6.3P25.


If the software cannot be upgraded immediately, consider changing the SNMP community string to something other than it’s default value of public.


Vendor Information

403315

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Nortel Networks __ Affected

Notified: April 16, 2002 Updated: April 18, 2002

Status

Affected

Vendor Statement

A software code update has been issued for Version 3.6.3P25; our recommendation is to upgrade from 3.6.3P24 to that version. The bulletin [see attachment] also gives recommended mitigating practices in case an immediate upgrade is not possible.

[CERT CA-2002-03 Advisory CVX v3.pdf](<https://kb.cert.org/static-bigvince-prod-kb-eb/vincepub/files/IAFY-599NE6_attach_CERT CA-2002-03 Advisory CVX v3.pdf> “CERT CA-2002-03 Advisory CVX v3.pdf” )

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23403315 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The CERT/CC credits “Michael Rawls” for discovering this vulnerability.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2002-0540
Severity Metric: 22.50 Date Public:

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.062 Low

EPSS

Percentile

93.6%

Related for VU:403315