cve-2004-1775
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 01:00
Severity ?
Summary
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:00:37.345Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-snmp-vacm(6179)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179"
          },
          {
            "name": "5030",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5030"
          },
          {
            "name": "VU#645400",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/645400"
          },
          {
            "name": "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-10-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "cisco-snmp-vacm(6179)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179"
        },
        {
          "name": "5030",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5030"
        },
        {
          "name": "VU#645400",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/645400"
        },
        {
          "name": "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1775",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-snmp-vacm(6179)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179"
            },
            {
              "name": "5030",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5030"
            },
            {
              "name": "VU#645400",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/645400"
            },
            {
              "name": "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1775",
    "datePublished": "2005-04-21T04:00:00",
    "dateReserved": "2005-04-21T00:00:00",
    "dateUpdated": "2024-08-08T01:00:37.345Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12434A88-88C6-4749-981F-E2B4D725F48F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A4864A2-D6BB-4E2A-9AA4-519EE0732D16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"793F494D-F6BD-4B23-92BE-83B9DD9D4A5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B6B0C2F-2FBE-4422-AD30-305100C595CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBEA01D2-B985-4575-AF00-144CE2E3024D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA7F94E8-86FC-456B-A7BB-57953F67F754\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1050ACB3-E5B2-4710-910B-F3DF4B49907F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ABE71F9-17D4-47C4-A762-18CC8716E477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7977DA9F-41DE-4482-B0CD-896EEEFB5689\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ADAB898-7728-4C14-B69A-7B8B06AFC894\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDBE69A0-85B1-423B-88FB-CDA80E9186EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C14C28A4-91C1-4AE0-8A14-8E98A569F7B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54424787-34AC-410D-985F-511ADB2BB144\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70F54F0C-AC91-4CB7-9FEB-257F03547864\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6A0D017-F26F-4429-891E-C7E1C66B6588\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26FA075D-4A9E-44EE-90CF-23947C9040EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A3DFAEC-4534-4A8D-9886-0723F57C7A63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5451772-87D4-42E2-8F48-D137670DA3E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D162976F-87A3-42BF-8C9F-A981B14F4673\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2606209-91BE-4BEB-A163-0D3873A033FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43581A57-418A-4A35-ACF2-1380A8DA8A82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC17E231-9256-4600-A33B-238E7E83CF85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A6D5468-BB6A-4665-964F-D8F636359CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D0082D5-CE3E-433A-84E9-1311C8B7899A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00EB78A4-B386-4FCB-A21F-BD2B2EFC9616\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ED30640-AABE-4CA2-8B45-509270748BBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA6FFE33-2891-48E5-9D0C-C52F88B2D76C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDEF6AED-4477-4AAC-9759-1996B77DFEE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9427851-B0DC-4CE6-8BFA-60619D1DC87C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D07DD94-0925-4FEE-9565-5F36B9AAF448\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC3A67F5-05C6-4097-A88E-0A0F165C12EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7126E176-D739-4102-8F10-1EEB8C6A219D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E90C0554-1A50-4341-AB07-80AA854673D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46FF39C5-CC37-4573-BB18-36254D38509B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4A85892-C3AB-4920-A949-A71BD0332D62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"752C3C6B-910D-4153-A162-DF255F60306B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"297FAD97-60C0-473D-A18D-03657B81B7E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AD4A33B-B13E-40C6-B47F-A406ACC6664F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E488E6E-87F0-4292-B97B-31087FDB4655\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D199CB1-A2A3-4678-9503-C5B61281755C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19952DC6-1186-4754-BB1E-BA1D78A19C96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"441CB9D6-5EDB-457B-B59E-D48B01AEAF5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28097F62-B51F-4A3B-BB31-6FA67E8C8B5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A11AF3F-C82F-4431-9CF1-84FDAD388D04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B674647-4438-4450-9DCA-25184D4E2682\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E5CC41-1344-4A65-A653-8012ACE2CF2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71FB7128-CF11-4903-97D7-418403A03CD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63EFB20A-78E2-4BA1-B87C-BB74E8982D99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A273401-9394-4BC3-879C-DE3EFC09B3F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DABF911-FCDF-4095-A95D-4BB73628FCA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77886493-C30E-439E-BBB4-3D34A8938378\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7813F511-CF6D-487F-9D1C-7A6CF85AD724\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"677DC4B6-8B3D-4A0D-9934-743FD7494DF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E272881F-0804-4190-A21D-3D0B9A774F13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B12B39FE-3E7B-4D96-8CD4-0D57C50A786A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F084DA16-24CB-41D1-92B7-C6E0499AAD10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA979D75-F60E-45F8-B99C-1402DC8CFCDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"194F0AB1-92E6-4CE3-A5A1-904BF75F05D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"884753D4-3AF0-4723-9D51-26BA7B4CA533\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAF3601D-DF44-4A10-A424-8E97C65A36A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC38BD6C-9823-4D2A-8BE2-60AABE3C4932\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06F049B3-FBE6-4951-896E-B8AE2D7BFBAB\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.\"}]",
      "id": "CVE-2004-1775",
      "lastModified": "2024-11-20T23:51:43.010",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2004-12-31T05:00:00.000",
      "references": "[{\"url\": \"http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/645400\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/5030\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/6179\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/645400\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/5030\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/6179\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2004-1775\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-12-31T05:00:00.000\",\"lastModified\":\"2024-11-20T23:51:43.010\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12434A88-88C6-4749-981F-E2B4D725F48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4864A2-D6BB-4E2A-9AA4-519EE0732D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"793F494D-F6BD-4B23-92BE-83B9DD9D4A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6B0C2F-2FBE-4422-AD30-305100C595CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBEA01D2-B985-4575-AF00-144CE2E3024D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7F94E8-86FC-456B-A7BB-57953F67F754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1050ACB3-E5B2-4710-910B-F3DF4B49907F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE71F9-17D4-47C4-A762-18CC8716E477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7977DA9F-41DE-4482-B0CD-896EEEFB5689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADAB898-7728-4C14-B69A-7B8B06AFC894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDBE69A0-85B1-423B-88FB-CDA80E9186EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14C28A4-91C1-4AE0-8A14-8E98A569F7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54424787-34AC-410D-985F-511ADB2BB144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F54F0C-AC91-4CB7-9FEB-257F03547864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A0D017-F26F-4429-891E-C7E1C66B6588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FA075D-4A9E-44EE-90CF-23947C9040EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3DFAEC-4534-4A8D-9886-0723F57C7A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5451772-87D4-42E2-8F48-D137670DA3E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D162976F-87A3-42BF-8C9F-A981B14F4673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2606209-91BE-4BEB-A163-0D3873A033FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43581A57-418A-4A35-ACF2-1380A8DA8A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC17E231-9256-4600-A33B-238E7E83CF85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6D5468-BB6A-4665-964F-D8F636359CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0082D5-CE3E-433A-84E9-1311C8B7899A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EB78A4-B386-4FCB-A21F-BD2B2EFC9616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED30640-AABE-4CA2-8B45-509270748BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6FFE33-2891-48E5-9D0C-C52F88B2D76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEF6AED-4477-4AAC-9759-1996B77DFEE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9427851-B0DC-4CE6-8BFA-60619D1DC87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D07DD94-0925-4FEE-9565-5F36B9AAF448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3A67F5-05C6-4097-A88E-0A0F165C12EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7126E176-D739-4102-8F10-1EEB8C6A219D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E90C0554-1A50-4341-AB07-80AA854673D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FF39C5-CC37-4573-BB18-36254D38509B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A85892-C3AB-4920-A949-A71BD0332D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752C3C6B-910D-4153-A162-DF255F60306B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297FAD97-60C0-473D-A18D-03657B81B7E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD4A33B-B13E-40C6-B47F-A406ACC6664F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E488E6E-87F0-4292-B97B-31087FDB4655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D199CB1-A2A3-4678-9503-C5B61281755C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19952DC6-1186-4754-BB1E-BA1D78A19C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441CB9D6-5EDB-457B-B59E-D48B01AEAF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28097F62-B51F-4A3B-BB31-6FA67E8C8B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A11AF3F-C82F-4431-9CF1-84FDAD388D04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B674647-4438-4450-9DCA-25184D4E2682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E5CC41-1344-4A65-A653-8012ACE2CF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FB7128-CF11-4903-97D7-418403A03CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63EFB20A-78E2-4BA1-B87C-BB74E8982D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A273401-9394-4BC3-879C-DE3EFC09B3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DABF911-FCDF-4095-A95D-4BB73628FCA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77886493-C30E-439E-BBB4-3D34A8938378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7813F511-CF6D-487F-9D1C-7A6CF85AD724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677DC4B6-8B3D-4A0D-9934-743FD7494DF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E272881F-0804-4190-A21D-3D0B9A774F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12B39FE-3E7B-4D96-8CD4-0D57C50A786A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F084DA16-24CB-41D1-92B7-C6E0499AAD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA979D75-F60E-45F8-B99C-1402DC8CFCDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194F0AB1-92E6-4CE3-A5A1-904BF75F05D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"884753D4-3AF0-4723-9D51-26BA7B4CA533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF3601D-DF44-4A10-A424-8E97C65A36A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC38BD6C-9823-4D2A-8BE2-60AABE3C4932\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06F049B3-FBE6-4951-896E-B8AE2D7BFBAB\"}]}]}],\"references\":[{\"url\":\"http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/645400\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/5030\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/6179\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/645400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/5030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/6179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.