| VID |
29008 |
| Severity |
40 |
| Port |
80 |
| Protocol |
TCP |
| Class |
CISCO |
| Detailed Description |
It is possible to execute arbitrary commandes on the remote Cisco router, by requesting them via http. Cisco Catalyst 3500 XL series switches could allow a remote attacker to execute arbitrary commands without supplying any authentication credentials, due to a vulnerability in the Web-based configuration interface. An attacker can use this vulnerability to view the configuration file and obtain user passwords. The attacker also may use this flaw to cut your network access to the internet, and may even lock you out of the router.
An example follows: http://catalyst/exec/show/config/cr This URL will show the configuration file, with all user passwords.
* References: http://www.iss.net/security_center/static/5415.php http://www.securityfocus.com/archive/1/141471 |
| Recommendation |
No remedy available as of June 2014. As a workaround, disable the web configuration interface completely. |
| Related URL |
CVE-2000-0945 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|