Korean
<< Back
VID 29029
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco Catalyst has a Enable password bypass vulnerability (CISCO bug ID CSCde42030). This vulnerability permits unauthorized access to the configuration mode and unauthorized configuration changes on a Catalyst switch.
Anyone who can obtain command line access to an affected switch can bypass password authentication to obtain "enable" mode access without knowledge of the "enable" password. If local user authentication is enabled, any username can be used to gain access to the switch without a valid password. This same local user could then enter enable without a valid password.

Command line access is provided through the console, telnet access, or ssh access methods; http access mode is not affected.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. This check also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml

* Platforms Affected:
Cisco Catalyst 4000, 6000, and 6500 with the Catalyst OS software version 7.5(1) only
Recommendation Upgrade to the Catalyst OS software version 7.6(1) or later. Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com .

For details, see http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)