First published: Wed Oct 25 2006(Updated: )
3Com Switch SS3 4400 switches, firmware 5.11, 6.00 and 6.10 and earlier, allow remote attackers to read the SNMP Read-Write Community string and conduct unauthorized actions via unspecified "normally restricted management packets on the device" that cause the community string to be returned.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
3com Superstack 3 Switch | =firmware_5.11 | |
3com Superstack 3 Switch | <=firmware_6.10 | |
3com Superstack 3 Switch | =firmware_6.00 | |
<=firmware_6.10 | ||
=firmware_5.11 | ||
=firmware_6.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5382 is considered to have a medium severity level due to the potential for unauthorized access to sensitive configurations.
To fix CVE-2006-5382, users should upgrade the firmware of 3Com Superstack 3 Switch 4400 to a version later than 6.10.
CVE-2006-5382 affects 3Com Superstack 3 Switch 4400 with firmware versions 5.11, 6.00, and 6.10 or earlier.
CVE-2006-5382 allows remote attackers to read sensitive SNMP Read-Write Community strings and perform unauthorized actions.
While a complete fix is to upgrade the firmware, temporarily securing SNMP settings and restricting access may serve as a partial workaround.