S-376: Cisco uBR10012 Series Devices SNMP Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-376: Cisco uBR10012 Series Devices SNMP Vulnerability
# 1  
Old 09-25-2008
S-376: Cisco uBR10012 Series Devices SNMP Vulnerability

Cisco uBR10012 series devices automatically enable Simple Network Management Protocol (SNMP) read/write access to the device if configured for linecard redundancy. This can be exploited by an attacker to gain complete control of the device. The risk is HIGH. Successful exploitation of the vulnerability may allow an attacker to gain complete control of the device.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Linux

Syslog Server for Cisco Devices

Hi, My name is SAMKZ and I'm a dummy with Linux and I'm so sad about that. I need to have a Syslog Server to archive Logs from my Cisco Routers and Switches. I'd like to know to most robust way of doing this. I've installed Centos 5.9 and Trixbox both on VMWares. I've read... (1 Reply)
Discussion started by: SAMKZ
1 Replies

2. Infrastructure Monitoring

Nagios 3.3.1 SNMP with Cisco Switch Fails

Hello all! I am running Nagios 3.3.1 and I am trying to get it to monitor the ports on my Cisco Catalyst 3524-XL-PWR Managed Switch. But I keep getting "(Return code of 127 is out of bounds - plugin may be missing)" I have installed and compiled the plugins and the snmp services on the Ubuntu... (0 Replies)
Discussion started by: RossIV
0 Replies

3. Shell Programming and Scripting

perl Net::SNMP version getting info from cisco switch

I am having trouble working with SNMP module with perl. I am trying to get SNMP version of target system. I use following code to get it however it resturns error as "Argument "v6.0.1" isn't numeric in numeric lt (<) at ./chk_env_upd.pl line 447." Get load table my $resultat =... (1 Reply)
Discussion started by: dynamax
1 Replies

4. Infrastructure Monitoring

keep track of devices using snmp

hello all, i want to keep track of all my devices using snmp, check for intrusion. any ideas? T (0 Replies)
Discussion started by: lemseffert
0 Replies

5. OS X (Apple)

Terminal scripting to automate login to cisco devices. Help Please !

Hello, I am new to the mac world, and would like to automate my login to cisco devices (routers, switches etc...), i am in a need of writing a script that i may just click on an icon on the desktop and it will open terminal and run a few command. as follow: telnet to an ip address type... (2 Replies)
Discussion started by: drdread
2 Replies

6. UNIX for Dummies Questions & Answers

Connecting to cisco devices via console

I use configure cisco devices daily using hyper terminal in windows via the serial port. Is there an alternative solution in unix that I can connect to a cisco console port via serial port? What application do I need?? (1 Reply)
Discussion started by: dgroove3
1 Replies

7. Cybersecurity

SNMP Vulnerability

SNMP Vulnerability: In a few minutes wire services and other news sources will begin breaking a story about widespread vulnerabilities in SNMP (Simple Network Management Protocol). Exploits of the vulnerability cause systems to fail or to be taken over. The vulnerability can be found in... (1 Reply)
Discussion started by: dpatel
1 Replies
Login or Register to Ask a Question
Info::Layer2::Catalyst(3pm)				User Contributed Perl Documentation			       Info::Layer2::Catalyst(3pm)

NAME
SNMP::Info::Layer2::Catalyst - SNMP Interface to Cisco Catalyst devices running Catalyst OS. AUTHOR
Max Baker SYNOPSIS
# Let SNMP::Info determine the correct subclass for you. my $cat = new SNMP::Info( AutoSpecify => 1, Debug => 1, DestHost => 'myswitch', Community => 'public', Version => 2 ) or die "Can't connect to DestHost. "; my $class = $cat->class(); print "SNMP::Info determined this device to fall under subclass : $class "; DESCRIPTION
SNMP::Info subclass to provide information for Cisco Catalyst series switches running CatOS. This class includes the Catalyst 2920, 4000, 5000, 6000 (hybrid mode) families. This subclass is not for all devices that have the name Catalyst. Note that some Catalyst switches run IOS, like the 2900 and 3550 families. Cisco Catalyst 1900 switches use their own MIB and have a separate subclass. Use the method above to have SNMP::Info determine the appropriate subclass before using this class directly. See SNMP::Info::device_type() for specifics. Note: Some older Catalyst switches will only talk SNMP version 1. Some newer ones will not return all their data if connected via Version 1. For speed or debugging purposes you can call the subclass directly, but not after determining a more specific class using the method above. my $cat = new SNMP::Info::Layer2::Catalyst(...); Inherited Classes SNMP::Info::CiscoStack SNMP::Info::CiscoVTP SNMP::Info::CDP SNMP::Info::CiscoStats SNMP::Info::CiscoPortSecurity SNMP::Info::Layer2 Required MIBs Inherited Classes' MIBs See "Required MIBs" in SNMP::Info::CiscoStack for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoVTP for its own MIB requirements. See "Required MIBs" in SNMP::Info::CDP for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoStats for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoPortSecurity for its own MIB requirements. See "Required MIBs" in SNMP::Info::Layer2 for its own MIB requirements. These MIBs are found in the standard v2 MIBs from Cisco. GLOBALS
These are methods that return scalar value from SNMP $cat->os() Returns 'catalyst' $cat->os_ver() Tries to use the value from SNMP::Info::CiscoStats->os_ver() and if it fails it grabs $cat->m_swver()->{1} and uses that. $cat->vendor() Returns 'cisco' $cat->cisco_comm_indexing() Returns 1. Use vlan indexing. Global Methods imported from SNMP::Info::CiscoStack See documentation in "GLOBALS" in SNMP::Info::CiscoStack for details. Globals imported from SNMP::Info::CiscoVTP See documentation in "GLOBALS" in SNMP::Info::CiscoVTP for details. Global Methods imported from SNMP::Info::CDP See documentation in "GLOBALS" in SNMP::Info::CDP for details. Global Methods imported from SNMP::Info::CiscoStats See documentation in "GLOBALS" in SNMP::Info::CiscoStats for details. Global Methods imported from SNMP::Info::CiscoPortSecurity See documentation in "GLOBALS" in SNMP::Info::CiscoPortSecurity for details. Globals imported from SNMP::Info::Layer2 See documentation in "GLOBALS" in SNMP::Info::Layer2 for details. TABLE METHODS
These are methods that return tables of information in the form of a reference to a hash. Overrides $cat->interfaces() Returns the map between SNMP Interface Identifier (iid) and physical port name. $cat->i_name() Returns reference to hash of iid to human set name. "portName" $cat->i_physical() Returns a map to IID for ports that are physical ports, not vlans, etc. $cat->bp_index() Returns reference to hash of bridge port table entries map back to interface identifier (iid) Crosses ("portCrossIndex") to ("portIfIndex") since some devices seem to have problems with BRIDGE-MIB Table Methods imported from SNMP::Info::CiscoStack See documentation in "TABLE METHODS" in SNMP::Info::CiscoStack for details. Table Methods imported from SNMP::Info::CiscoVTP See documentation in "TABLE METHODS" in SNMP::Info::CiscoVTP for details. Table Methods imported from SNMP::Info::CDP See documentation in "TABLE METHODS" in SNMP::Info::CDP for details. Table Methods imported from SNMP::Info::CiscoStats See documentation in "TABLE METHODS" in SNMP::Info::CiscoStats for details. Table Methods imported from SNMP::Info::CiscoPortSecurity See documentation in "TABLE METHODS" in SNMP::Info::CiscoPortSecurity for details. Table Methods imported from SNMP::Info::Layer2 See documentation in "TABLE METHODS" in SNMP::Info::Layer2 for details. perl v5.12.4 2011-09-28 Info::Layer2::Catalyst(3pm)