CVE-2007-1257
Summary
| CVE | CVE-2007-1257 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-03-03 20:19:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Network Analysis Module | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| US-CERT Vulnerability Note VU#472412 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| osvdb.org/33066 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| Cisco Catalyst 6000 and 6500 and Cisco 7600 Network Analysis Module SNMP Spoofing Lets Remote Users Gain Access - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| Cisco Multiple Products Network Analysis Module SNMP Communication Spoofing Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Cisco Products NAM SNMP Spoofing Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | af854a3a-2127-422b-91ae-364da2661108 | www.cisco.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.