CWE
NVD-CWE-Other
Advisory Published
CVE Published
Updated

CVE-2004-1775

First published: Fri Dec 31 2004(Updated: )

Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Puppet Cisco IOS=12.0da
Puppet Cisco IOS=12.0db
Puppet Cisco IOS=12.0dc
Puppet Cisco IOS=12.0s
Puppet Cisco IOS=12.0sc
Puppet Cisco IOS=12.0sl
Puppet Cisco IOS=12.0st
Puppet Cisco IOS=12.0t
Puppet Cisco IOS=12.0xa
Puppet Cisco IOS=12.0xb
Puppet Cisco IOS=12.0xc
Puppet Cisco IOS=12.0xd
Puppet Cisco IOS=12.0xe
Puppet Cisco IOS=12.0xf
Puppet Cisco IOS=12.0xg
Puppet Cisco IOS=12.0xh
Puppet Cisco IOS=12.0xi
Puppet Cisco IOS=12.0xj
Puppet Cisco IOS=12.0xk
Puppet Cisco IOS=12.0xl
Puppet Cisco IOS=12.0xm
Puppet Cisco IOS=12.0xn
Puppet Cisco IOS=12.0xp
Puppet Cisco IOS=12.0xq
Puppet Cisco IOS=12.0xr
Puppet Cisco IOS=12.0xs
Puppet Cisco IOS=12.0xu
Puppet Cisco IOS=12.0xv
Puppet Cisco IOS=12.0xw
Puppet Cisco IOS=12.1
Puppet Cisco IOS=12.1aa
Puppet Cisco IOS=12.1cx
Puppet Cisco IOS=12.1da
Puppet Cisco IOS=12.1db
Puppet Cisco IOS=12.1dc
Puppet Cisco IOS=12.1e
Puppet Cisco IOS=12.1ea
Puppet Cisco IOS=12.1ec
Puppet Cisco IOS=12.1ex
Puppet Cisco IOS=12.1t
Puppet Cisco IOS=12.1xa
Puppet Cisco IOS=12.1xb
Puppet Cisco IOS=12.1xc
Puppet Cisco IOS=12.1xd
Puppet Cisco IOS=12.1xe
Puppet Cisco IOS=12.1xf
Puppet Cisco IOS=12.1xg
Puppet Cisco IOS=12.1xh
Puppet Cisco IOS=12.1xi
Puppet Cisco IOS=12.1xk
Puppet Cisco IOS=12.1xl
Puppet Cisco IOS=12.1xm
Puppet Cisco IOS=12.1xp
Puppet Cisco IOS=12.1xq
Puppet Cisco IOS=12.1xr
Puppet Cisco IOS=12.1xs
Puppet Cisco IOS=12.1xt
Puppet Cisco IOS=12.1xu
Puppet Cisco IOS=12.1xv
Puppet Cisco IOS=12.1xw
Puppet Cisco IOS=12.1xx
Puppet Cisco IOS=12.1xy
Puppet Cisco IOS=12.1xz
Puppet Cisco IOS=12.1ya
Puppet Cisco IOS=12.1yb
Puppet Cisco IOS=12.1yc
Puppet Cisco IOS=12.1yd
Cisco CatOS=5.5
Cisco CatOS=6.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2004-1775?

    CVE-2004-1775 has a CVSS score that indicates it has a high severity rating due to the potential for unauthorized access to device configurations.

  • How do I fix CVE-2004-1775?

    To fix CVE-2004-1775, update to the latest version of Cisco IOS or CatOS that addresses this vulnerability and change any default community strings to unique values.

  • Which devices are affected by CVE-2004-1775?

    CVE-2004-1775 affects specific versions of Cisco IOS 12.0 and 12.1, as well as CatOS versions 5.5 and 6.1.

  • What are the risks associated with CVE-2004-1775?

    The risks associated with CVE-2004-1775 include unauthorized remote access to read and modify device configurations, potentially compromising network security.

  • Is there a workaround for CVE-2004-1775?

    A workaround for CVE-2004-1775 is to restrict access to the SNMP community strings by applying access control lists or disabling SNMP if it is not needed.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203