First published: Fri Dec 31 2004(Updated: )
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.1xg | |
Cisco IOS | =12.0xc | |
Cisco IOS | =12.0xk | |
Cisco IOS | =12.0xr | |
Cisco IOS | =12.1xm | |
Cisco IOS | =12.1xi | |
Cisco IOS | =12.0st | |
Cisco IOS | =12.1e | |
Cisco IOS | =12.1xc | |
Cisco IOS | =12.1xp | |
Cisco IOS | =12.1ya | |
Cisco IOS | =12.1yd | |
Cisco IOS | =12.0dc | |
Cisco IOS | =12.0xq | |
Cisco IOS | =12.1xs | |
Cisco IOS | =12.0xe | |
Cisco IOS | =12.1xy | |
Cisco IOS | =12.0xd | |
Cisco IOS | =12.1xz | |
Cisco IOS | =12.0xj | |
Cisco IOS | =12.1t | |
Cisco IOS | =12.1xr | |
Cisco IOS | =12.1db | |
Cisco IOS | =12.1xe | |
Cisco IOS | =12.0xl | |
Cisco IOS | =12.0xs | |
Cisco IOS | =12.1xb | |
Cisco IOS | =12.1xl | |
Cisco IOS | =12.0xb | |
Cisco IOS | =12.1xk | |
Cisco IOS | =12.0xh | |
Cisco IOS | =12.0t | |
Cisco IOS | =12.1xw | |
Cisco IOS | =12.1yb | |
Cisco IOS | =12.0xu | |
Cisco IOS | =12.1dc | |
Cisco IOS | =12.1ex | |
Cisco IOS | =12.1 | |
Cisco IOS | =12.0sl | |
Cisco IOS | =12.0db | |
Cisco IOS | =12.1ec | |
Cisco IOS | =12.1cx | |
Cisco IOS | =12.1xh | |
Cisco IOS | =12.0xa | |
Cisco IOS | =12.1xu | |
Cisco IOS | =12.0sc | |
Cisco IOS | =12.1aa | |
Cisco IOS | =12.0xn | |
Cisco IOS | =12.0da | |
Cisco IOS | =12.1xx | |
Cisco IOS | =12.0xm | |
Cisco IOS | =12.1xd | |
Cisco IOS | =12.1xq | |
Cisco IOS | =12.0s | |
Cisco IOS | =12.1ea | |
Cisco IOS | =12.1xf | |
Cisco IOS | =12.1da | |
Cisco IOS | =12.0xw | |
Cisco IOS | =12.1xa | |
Cisco IOS | =12.0xg | |
Cisco IOS | =12.1yc | |
Cisco IOS | =12.0xp | |
Cisco IOS | =12.0xv | |
Cisco IOS | =12.1xt | |
Cisco IOS | =12.0xf | |
Cisco IOS | =12.0xi | |
Cisco IOS | =12.1xv | |
Cisco CatOS | =5.5 | |
Cisco CatOS | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1775 has a CVSS score that indicates it has a high severity rating due to the potential for unauthorized access to device configurations.
To fix CVE-2004-1775, update to the latest version of Cisco IOS or CatOS that addresses this vulnerability and change any default community strings to unique values.
CVE-2004-1775 affects specific versions of Cisco IOS 12.0 and 12.1, as well as CatOS versions 5.5 and 6.1.
The risks associated with CVE-2004-1775 include unauthorized remote access to read and modify device configurations, potentially compromising network security.
A workaround for CVE-2004-1775 is to restrict access to the SNMP community strings by applying access control lists or disabling SNMP if it is not needed.