FKIE_CVE-2004-1775
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml | Patch, Vendor Advisory | |
| cve@mitre.org | http://www.kb.cert.org/vuls/id/645400 | Patch, Third Party Advisory, US Government Resource | |
| cve@mitre.org | http://www.securityfocus.com/bid/5030 | Patch | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6179 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/645400 | Patch, Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/5030 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6179 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.0da | |
| cisco | ios | 12.0db | |
| cisco | ios | 12.0dc | |
| cisco | ios | 12.0s | |
| cisco | ios | 12.0sc | |
| cisco | ios | 12.0sl | |
| cisco | ios | 12.0st | |
| cisco | ios | 12.0t | |
| cisco | ios | 12.0xa | |
| cisco | ios | 12.0xb | |
| cisco | ios | 12.0xc | |
| cisco | ios | 12.0xd | |
| cisco | ios | 12.0xe | |
| cisco | ios | 12.0xf | |
| cisco | ios | 12.0xg | |
| cisco | ios | 12.0xh | |
| cisco | ios | 12.0xi | |
| cisco | ios | 12.0xj | |
| cisco | ios | 12.0xk | |
| cisco | ios | 12.0xl | |
| cisco | ios | 12.0xm | |
| cisco | ios | 12.0xn | |
| cisco | ios | 12.0xp | |
| cisco | ios | 12.0xq | |
| cisco | ios | 12.0xr | |
| cisco | ios | 12.0xs | |
| cisco | ios | 12.0xu | |
| cisco | ios | 12.0xv | |
| cisco | ios | 12.0xw | |
| cisco | ios | 12.1 | |
| cisco | ios | 12.1aa | |
| cisco | ios | 12.1cx | |
| cisco | ios | 12.1da | |
| cisco | ios | 12.1db | |
| cisco | ios | 12.1dc | |
| cisco | ios | 12.1e | |
| cisco | ios | 12.1ea | |
| cisco | ios | 12.1ec | |
| cisco | ios | 12.1ex | |
| cisco | ios | 12.1t | |
| cisco | ios | 12.1xa | |
| cisco | ios | 12.1xb | |
| cisco | ios | 12.1xc | |
| cisco | ios | 12.1xd | |
| cisco | ios | 12.1xe | |
| cisco | ios | 12.1xf | |
| cisco | ios | 12.1xg | |
| cisco | ios | 12.1xh | |
| cisco | ios | 12.1xi | |
| cisco | ios | 12.1xk | |
| cisco | ios | 12.1xl | |
| cisco | ios | 12.1xm | |
| cisco | ios | 12.1xp | |
| cisco | ios | 12.1xq | |
| cisco | ios | 12.1xr | |
| cisco | ios | 12.1xs | |
| cisco | ios | 12.1xt | |
| cisco | ios | 12.1xu | |
| cisco | ios | 12.1xv | |
| cisco | ios | 12.1xw | |
| cisco | ios | 12.1xx | |
| cisco | ios | 12.1xy | |
| cisco | ios | 12.1xz | |
| cisco | ios | 12.1ya | |
| cisco | ios | 12.1yb | |
| cisco | ios | 12.1yc | |
| cisco | ios | 12.1yd | |
| cisco | catos | 5.5 | |
| cisco | catos | 6.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
"matchCriteriaId": "12434A88-88C6-4749-981F-E2B4D725F48F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
"matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6B0C2F-2FBE-4422-AD30-305100C595CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
"matchCriteriaId": "1050ACB3-E5B2-4710-910B-F3DF4B49907F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE71F9-17D4-47C4-A762-18CC8716E477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
"matchCriteriaId": "7977DA9F-41DE-4482-B0CD-896EEEFB5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADAB898-7728-4C14-B69A-7B8B06AFC894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBE69A0-85B1-423B-88FB-CDA80E9186EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
"matchCriteriaId": "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
"matchCriteriaId": "54424787-34AC-410D-985F-511ADB2BB144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
"matchCriteriaId": "70F54F0C-AC91-4CB7-9FEB-257F03547864",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A0D017-F26F-4429-891E-C7E1C66B6588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
"matchCriteriaId": "26FA075D-4A9E-44EE-90CF-23947C9040EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3DFAEC-4534-4A8D-9886-0723F57C7A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
"matchCriteriaId": "E5451772-87D4-42E2-8F48-D137670DA3E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
"matchCriteriaId": "D162976F-87A3-42BF-8C9F-A981B14F4673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*",
"matchCriteriaId": "E2606209-91BE-4BEB-A163-0D3873A033FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
"matchCriteriaId": "43581A57-418A-4A35-ACF2-1380A8DA8A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
"matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D5468-BB6A-4665-964F-D8F636359CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0082D5-CE3E-433A-84E9-1311C8B7899A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
"matchCriteriaId": "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED30640-AABE-4CA2-8B45-509270748BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
"matchCriteriaId": "FDEF6AED-4477-4AAC-9759-1996B77DFEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
"matchCriteriaId": "C9427851-B0DC-4CE6-8BFA-60619D1DC87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
"matchCriteriaId": "6D07DD94-0925-4FEE-9565-5F36B9AAF448",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3A67F5-05C6-4097-A88E-0A0F165C12EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
"matchCriteriaId": "E90C0554-1A50-4341-AB07-80AA854673D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A85892-C3AB-4920-A949-A71BD0332D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
"matchCriteriaId": "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
"matchCriteriaId": "297FAD97-60C0-473D-A18D-03657B81B7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD4A33B-B13E-40C6-B47F-A406ACC6664F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
"matchCriteriaId": "0E488E6E-87F0-4292-B97B-31087FDB4655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
"matchCriteriaId": "0D199CB1-A2A3-4678-9503-C5B61281755C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
"matchCriteriaId": "19952DC6-1186-4754-BB1E-BA1D78A19C96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"matchCriteriaId": "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"matchCriteriaId": "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*",
"matchCriteriaId": "8A11AF3F-C82F-4431-9CF1-84FDAD388D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"matchCriteriaId": "3B674647-4438-4450-9DCA-25184D4E2682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"matchCriteriaId": "86E5CC41-1344-4A65-A653-8012ACE2CF2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"matchCriteriaId": "71FB7128-CF11-4903-97D7-418403A03CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"matchCriteriaId": "63EFB20A-78E2-4BA1-B87C-BB74E8982D99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
"matchCriteriaId": "3A273401-9394-4BC3-879C-DE3EFC09B3F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
"matchCriteriaId": "6DABF911-FCDF-4095-A95D-4BB73628FCA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"matchCriteriaId": "77886493-C30E-439E-BBB4-3D34A8938378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"matchCriteriaId": "7813F511-CF6D-487F-9D1C-7A6CF85AD724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
"matchCriteriaId": "677DC4B6-8B3D-4A0D-9934-743FD7494DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
"matchCriteriaId": "E272881F-0804-4190-A21D-3D0B9A774F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
"matchCriteriaId": "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
"matchCriteriaId": "F084DA16-24CB-41D1-92B7-C6E0499AAD10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
"matchCriteriaId": "BA979D75-F60E-45F8-B99C-1402DC8CFCDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
"matchCriteriaId": "194F0AB1-92E6-4CE3-A5A1-904BF75F05D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"matchCriteriaId": "884753D4-3AF0-4723-9D51-26BA7B4CA533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF3601D-DF44-4A10-A424-8E97C65A36A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string."
}
],
"id": "CVE-2004-1775",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/645400"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/5030"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/645400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/5030"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…