Lucene search

K
saintSAINT CorporationSAINT:291D610D59DFE0FA1F9098E188A2FAC7
HistoryDec 23, 2010 - 12:00 a.m.

Cisco IOS HTTP exec path command execution

2010-12-2300:00:00
SAINT Corporation
www.saintcorporation.com
20

0.965 High

EPSS

Percentile

99.6%

Added: 12/23/2010
CVE: CVE-2000-0945
BID: 1846
OSVDB: 444

Background

The Cisco Internetwork Operating System (IOS) is the operating system used by Cisco routers.

Problem

A remote attacker could execute arbitrary commands through HTTP requests by requesting a path beginning with **/exec**.

Resolution

Set an enable password on the Cisco device.

References

<http://archives.neohapsis.com/archives/bugtraq/2000-10/0380.html&gt;
<http://archives.neohapsis.com/archives/bugtraq/2000-11/0194.html&gt;

Limitations

Exploit works on Cisco Catalyst 3500 XL devices with the enable password unset.

Platforms

Cisco

0.965 High

EPSS

Percentile

99.6%

Related for SAINT:291D610D59DFE0FA1F9098E188A2FAC7