CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
92.0%
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM’s own IP address.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | network_analysis_module | * | cpe:2.3:h:cisco:network_analysis_module:*:*:*:*:*:*:*:* |
cisco | catalyst_6000_ws-svc-nam-1 | 2.2(1a) | cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_6000_ws-svc-nam-2 | 2.2(1a) | cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_6000_ws-x6380-nam | 3.1(1a) | cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_6500_ws-svc-nam-1 | 2.2(1a) | cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_6500_ws-svc-nam-2 | 2.2(1a) | cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_6500_ws-x6380-nam | 3.1(1a) | cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_7600_ws-svc-nam-1 | 2.2(1a) | cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_7600_ws-svc-nam-2 | 2.2(1a) | cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\(1a\):*:*:*:*:*:*:* |
cisco | catalyst_7600_ws-x6380-nam | 3.1(1a) | cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\(1a\):*:*:*:*:*:*:* |
osvdb.org/33066
secunia.com/advisories/24344
www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml
www.kb.cert.org/vuls/id/472412
www.securityfocus.com/bid/22751
www.securitytracker.com/id?1017710
www.vupen.com/english/advisories/2007/0783
exchange.xforce.ibmcloud.com/vulnerabilities/32750
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188