7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.062 Low
EPSS
Percentile
93.6%
The Nortel Networks CVX 1800 Multi-Service Access Switch discloses privileged information.
The CVX 1800 Multi-Service Access Switch is a large modem bank typically used by large carriers and ISP’s. When the CVX 1800 is queried with a specially crafted snmpwalk, it will respond with all usernames and passwords for administrator accounts on the vulnerable CVX 1800.
An attacker can gain access to sensitive information such as administrator usernames and passwords. The attacker could then use this information to make unauthorized configuration changes to the CVX 1800.
Upgrade the software on the CVX 1800 to 3.6.3P25.
If the software cannot be upgraded immediately, consider changing the SNMP community string to something other than it’s default value of public.
403315
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: April 16, 2002 Updated: April 18, 2002
Affected
A software code update has been issued for Version 3.6.3P25; our recommendation is to upgrade from 3.6.3P24 to that version. The bulletin [see attachment] also gives recommended mitigating practices in case an immediate upgrade is not possible.
[](<https://kb.cert.org/static-bigvince-prod-kb-eb/vincepub/files/IAFY-599NE6_attach_CERT CA-2002-03 Advisory CVX v3.pdf> “CERT CA-2002-03 Advisory CVX v3.pdf” )
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23403315 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
The CERT/CC credits “Michael Rawls” for discovering this vulnerability.
This document was written by Ian A. Finlay.
CVE IDs: | CVE-2002-0540 |
---|---|
Severity Metric: | 22.50 Date Public: |