![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10981 |
Category: | CISCO |
Title: | CSCdt65960 |
Summary: | NOSUMMARY |
Description: | Description: The Cisco 6400 Access Concentrator Node Route Processor 2 (NRP2) module allows Telnet access when no password has been set. The correct response is to disallow any remote access to the module until the password has been set. This vulnerability may result in users gaining unintended access to secure systems. This vulnerability is documented as Cisco bug ID CSCdt65960. Solution : http://www.cisco.com/warp/public/707/6400-nrp2-telnet-vuln-pub.shtml Risk factor : High *** As Nessus solely relied on the banner of the remote host *** this might be a false positive |
Cross-Ref: |
BugTraq ID: 2874 Common Vulnerability Exposure (CVE) ID: CVE-2001-0757 http://www.securityfocus.com/bid/2874 CERT/CC vulnerability note: VU#516659 http://www.kb.cert.org/vuls/id/516659 Computer Incident Advisory Center Bulletin: L-097 http://www.ciac.org/ciac/bulletins/l-097.shtml Cisco Security Advisory: 20010614 Cisco 6400 NRP2 Telnet Vulnerability http://www.cisco.com/warp/public/707/6400-nrp2-telnet-vuln-pub.shtml http://www.osvdb.org/804 XForce ISS Database: cisco-nrp2-telnet-access(6691) https://exchange.xforce.ibmcloud.com/vulnerabilities/6691 |
Copyright | This script is (C) 2002 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |