CVE-2007-1257
Summary
| CVE | CVE-2007-1257 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-03-03 20:19:00 UTC |
| Updated | 2017-10-11 01:31:00 UTC |
| Description | The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-1 | 2.2(1a) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-2 | 2.2(1a) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-x6380-nam | 3.1(1a) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6000 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-1 | 2.2(1a) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-2 | 2.2(1a) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-x6380-nam | 3.1(1a) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 6500 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-1 | 2.2(1a) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-1 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-2 | 2.2(1a) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-svc-nam-2 | 2.2\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-x6380-nam | 3.1(1a) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Catalyst 7600 Ws-x6380-nam | 3.1\(1a\) | All | All | All |
| Hardware | Cisco | Network Analysis Module | All | All | All | All |
| Hardware | Cisco | Network Analysis Module | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| US-CERT Vulnerability Note VU#472412 | CERT-VN | www.kb.cert.org | US Government Resource |
| Cisco Products NAM SNMP Spoofing Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| 33066 | OSVDB | osvdb.org | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | CISCO | www.cisco.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Cisco Catalyst 6000 and 6500 and Cisco 7600 Network Analysis Module SNMP Spoofing Lets Remote Users Gain Access - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Cisco Multiple Products Network Analysis Module SNMP Communication Spoofing Vulnerability | BID | www.securityfocus.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.