Vulnerability Description
3Com Switch SS3 4400 switches, firmware 5.11, 6.00 and 6.10 and earlier, allow remote attackers to read the SNMP Read-Write Community string and conduct unauthorized actions via unspecified "normally restricted management packets on the device" that cause the community string to be returned.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 3Com | Superstack 3 Switch 4400 | <= firmware_6.10 |
References
- http://secunia.com/advisories/22818
- http://securitytracker.com/id?1017128
- http://www.3com.com/securityalert/alerts/3COM-06-004.html
- http://www.securityfocus.com/bid/20736
- http://www.vupen.com/english/advisories/2006/4184
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29779
- http://secunia.com/advisories/22818
- http://securitytracker.com/id?1017128
- http://www.3com.com/securityalert/alerts/3COM-06-004.html
- http://www.securityfocus.com/bid/20736
- http://www.vupen.com/english/advisories/2006/4184
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29779
FAQ
What is CVE-2006-5382?
CVE-2006-5382 is a vulnerability with a CVSS score of 7.5 (HIGH). 3Com Switch SS3 4400 switches, firmware 5.11, 6.00 and 6.10 and earlier, allow remote attackers to read the SNMP Read-Write Community string and conduct unauthorized actions via unspecified "normally ...
How severe is CVE-2006-5382?
CVE-2006-5382 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5382?
Check the references section above for vendor advisories and patch information. Affected products include: 3Com Superstack 3 Switch 4400.