Vulnerability Description
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | 12.0da |
| Cisco | Catos | 5.5 |
References
- http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtmlPatchVendor Advisory
- http://www.kb.cert.org/vuls/id/645400PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/5030Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6179
- http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtmlPatchVendor Advisory
- http://www.kb.cert.org/vuls/id/645400PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/5030Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6179
FAQ
What is CVE-2004-1775?
CVE-2004-1775 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write ...
How severe is CVE-2004-1775?
CVE-2004-1775 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1775?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios, Cisco Catos.