| VID |
29046 |
| Severity |
20 |
| Port |
161 |
| Protocol |
UDP |
| Class |
CISCO |
| Detailed Description |
The Cisco VPN concentrator has a application banner information leakage vulnerability(CISCO Bug ID CSCdu35577). The SSH banner gives out information about the device apart from the SSH version numbers. The FTP banner gives information about the device and the local time. An incorrect HTTP page request gives out information about the device, the name of the person who compiled the software and the time of compilation. * Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.
* References: http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml http://www.ciac.org/ciac/bulletins/m-119.shtml
* Platforms Affected: Cisco VPN 3000 series concentrator 2.x.x, 3.0.x, 3.1.x, and the earlier than 3.5.4 |
| Recommendation |
Upgrade to the Cisco VPN 3000 series concentrator version 3.6(Rel) or later, or 3.5.4 or later. Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/kobayashi/sw-center/vpn/3000/ .
For details, see http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml . |
| Related URL |
CVE-2002-1094 (CVE) |
| Related URL |
5609,5621,5623,5624 (SecurityFocus) |
| Related URL |
10020 (ISS) |
|