SNMP Version 3 Authentication Vulnerabilities (cisco-sa-20080610-snmpv3)

critical Nessus Plugin ID 49016



The remote device is missing a vendor-supplied security patch.


Multiple Cisco products contain either of two authentication vulnerabilities in the Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of network information or may enable an attacker to perform configuration changes to vulnerable devices. The SNMP server is an optional service that is disabled by default in Cisco products. Only SNMPv3 is impacted by these vulnerabilities.
Workarounds are available for mitigating the impact of the vulnerabilities described in this document. Note: SNMP versions 1, 2 and 2c are not impacted by these vulnerabilities. The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability Note VU#878044.


Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20080610-snmpv3.

See Also

Plugin Details

Severity: Critical

ID: 49016

File Name: cisco-sa-20080610-snmpv3http.nasl

Version: 1.28

Type: local

Family: CISCO

Published: 9/1/2010

Updated: 11/15/2018

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/16/2012

Vulnerability Publication Date: 6/10/2008

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2008-0960

BID: 29623


CISCO-SA: cisco-sa-20080610-snmpv3

CWE: 287