![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11547 |
Category: | CISCO |
Title: | CSCea42030 |
Summary: | NOSUMMARY |
Description: | Description: The remote Catalyst is vulnerable to password bypass vulnerability. Basically, an attacker who has a command line access may gain the 'enable' privileges without having to know the right password, which would allow him to reconfigure this host remotely. This vulnerability is documented with the CISCO bug ID CSCde42030 Solution : http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml Risk factor : High *** As Nessus solely relied on the banner of the remote host *** this might be a false positive |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0216 CERT/CC vulnerability note: VU#443257 http://www.kb.cert.org/vuls/id/443257 Cisco Security Advisory: 20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml. |
Copyright | This script is (C) 2003 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |