S-376: Cisco uBR10012 Series Devices SNMP Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-376: Cisco uBR10012 Series Devices SNMP Vulnerability
# 1  
Old 09-25-2008
S-376: Cisco uBR10012 Series Devices SNMP Vulnerability

Cisco uBR10012 series devices automatically enable Simple Network Management Protocol (SNMP) read/write access to the device if configured for linecard redundancy. This can be exploited by an attacker to gain complete control of the device. The risk is HIGH. Successful exploitation of the vulnerability may allow an attacker to gain complete control of the device.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Linux

Syslog Server for Cisco Devices

Hi, My name is SAMKZ and I'm a dummy with Linux and I'm so sad about that. I need to have a Syslog Server to archive Logs from my Cisco Routers and Switches. I'd like to know to most robust way of doing this. I've installed Centos 5.9 and Trixbox both on VMWares. I've read... (1 Reply)
Discussion started by: SAMKZ
1 Replies

2. Infrastructure Monitoring

Nagios 3.3.1 SNMP with Cisco Switch Fails

Hello all! I am running Nagios 3.3.1 and I am trying to get it to monitor the ports on my Cisco Catalyst 3524-XL-PWR Managed Switch. But I keep getting "(Return code of 127 is out of bounds - plugin may be missing)" I have installed and compiled the plugins and the snmp services on the Ubuntu... (0 Replies)
Discussion started by: RossIV
0 Replies

3. Shell Programming and Scripting

perl Net::SNMP version getting info from cisco switch

I am having trouble working with SNMP module with perl. I am trying to get SNMP version of target system. I use following code to get it however it resturns error as "Argument "v6.0.1" isn't numeric in numeric lt (<) at ./chk_env_upd.pl line 447." Get load table my $resultat =... (1 Reply)
Discussion started by: dynamax
1 Replies

4. Infrastructure Monitoring

keep track of devices using snmp

hello all, i want to keep track of all my devices using snmp, check for intrusion. any ideas? T (0 Replies)
Discussion started by: lemseffert
0 Replies

5. OS X (Apple)

Terminal scripting to automate login to cisco devices. Help Please !

Hello, I am new to the mac world, and would like to automate my login to cisco devices (routers, switches etc...), i am in a need of writing a script that i may just click on an icon on the desktop and it will open terminal and run a few command. as follow: telnet to an ip address type... (2 Replies)
Discussion started by: drdread
2 Replies

6. UNIX for Dummies Questions & Answers

Connecting to cisco devices via console

I use configure cisco devices daily using hyper terminal in windows via the serial port. Is there an alternative solution in unix that I can connect to a cisco console port via serial port? What application do I need?? (1 Reply)
Discussion started by: dgroove3
1 Replies

7. Cybersecurity

SNMP Vulnerability

SNMP Vulnerability: In a few minutes wire services and other news sources will begin breaking a story about widespread vulnerabilities in SNMP (Simple Network Management Protocol). Exploits of the vulnerability cause systems to fail or to be taken over. The vulnerability can be found in... (1 Reply)
Discussion started by: dpatel
1 Replies
Login or Register to Ask a Question
Info::Layer3::Aironet(3pm)				User Contributed Perl Documentation				Info::Layer3::Aironet(3pm)

NAME
SNMP::Info::Layer3::Aironet - Perl5 Interface to Cisco Aironet Wireless Devices running Aironet software, not IOS AUTHOR
Max Baker SYNOPSIS
# Let SNMP::Info determine the correct subclass for you. my $aironet = new SNMP::Info( AutoSpecify => 1, Debug => 1, DestHost => 'myswitch', Community => 'public', Version => 2 ) or die "Can't connect to DestHost. "; my $class = $aironet->class(); print "SNMP::Info determined this device to fall under subclass : $class "; DESCRIPTION
SNMP::Info subclass to provide access to SNMP data for an Aironet device running Aironet software, not cisco IOS. Note there are two classes for Aironet devices : SNMP::Info::Layer3::Aironet This class is for devices running Aironet software (older) SNMP::Info::Layer2::Aironet This class is for devices running Cisco IOS software (newer) For speed or debugging purposes you can call the subclass directly, but not after determining a more specific class using the method above. my $aironet = new SNMP::Info::Layer3::Aironet(...); Inherited Classes SNMP::Info::Layer3 Required MIBs AWCVX-MIB IEEE802dot11-MIB These MIBs are now included in the v2.tar.gz archive available from ftp.cisco.com. Make sure you have a current version. GLOBALS
These are methods that return scalar value from SNMP $aironet->awc_duplex() Gives the admin duplex setting for the Ethernet Port. "awcEtherDuplex.0" $aironet->mac() Gives the MAC Address of the wireless side "dot11StationID.2" $aironet->os() 'aironet' $aironet->os_ver Tries to cull the version from the description field. $aironet->vendor() Returns 'cisco'. Globals imported from SNMP::Info::Layer3 See documentation in "GLOBALS" in SNMP::Info::Layer3 for details. TABLE METHODS
These are methods that return tables of information in the form of a reference to a hash. Overrides $aironet->bp_index() Takes the bp_index() value from SNMP::Info::Bridge and overrides the wireless port to be assigned to the transparent bridge port (port 0) $aironet->fw_mac() Adds static table entries from bs_mac() to port 0 so that wireless MAC addresses will be reported. Forwarding table entries for port 0 are removed. $aironet->fw_port() Adds the static table port mappings to the forwarding table port mappings by adding bs_port() to fw_port() $aironet->i_duplex() Adds the value of awc_duplex() to each Ethernet port seen. $aironet->i_mac() Overrides the values for i_mac with the value from awc_mac() if they are set. $aironet->i_ignore() Ignores ports that are of type ``rptr'' and ``lo''. Aironet specific items $aironet->awc_default_mac() Gives the default MAC address of each interface. "awcIfDefaultPhyAddress" $aironet->awc_mac() Gives the actual MAC address of each interface. "awcIfPhyAddress" $aironet->awc_ip() Gives the IP Address assigned to each interface. "awcIfIpAddress" $aironet->awc_netmask() Gives the NetMask for each interface. "awcIfIpNetMask" $aironet->awc_msdu() "awcIfMSDUMaxLength" Table Methods imported from SNMP::Info::Layer3 See documentation in "TABLE METHODS" in SNMP::Info::Layer3 for details. perl v5.12.4 2011-09-28 Info::Layer3::Aironet(3pm)