SNMP Version 3 Authentication Bypass Vulnerabilities (cisco-sa-20080610-snmpv3)

critical Nessus Plugin ID 66697

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Multiple Cisco products contain either of two authentication vulnerabilities in the Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of network information or may enable an attacker to perform configuration changes to vulnerable devices. The SNMP server is an optional service that is disabled by default in Cisco products. Only SNMPv3 is impacted by these vulnerabilities.
Workarounds are available for mitigating the impact of the vulnerabilities described in this document. Note: SNMP versions 1, 2 and 2c are not impacted by these vulnerabilities. The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability Note VU#878044.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20080610-snmpv3.

See Also

http://www.nessus.org/u?0784818d

Plugin Details

Severity: Critical

ID: 66697

File Name: cisco-sa-20080610-snmpv3-nxos.nasl

Version: 1.12

Type: combined

Family: CISCO

Published: 5/31/2013

Updated: 10/29/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/16/2012

Vulnerability Publication Date: 6/10/2008

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2008-0960

BID: 29623

CWE: 287

CISCO-SA: cisco-sa-20080610-snmpv3

CISCO-BUG-ID: CSCsf04754