First published: Sat Mar 03 2007(Updated: )
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Network Analysis Module Software | ||
Cisco Catalyst 7600 | =2.2\(1a\) | |
Cisco Catalyst 6000 | =2.2\(1a\) | |
Cisco Catalyst 7600 | =2.2\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =2.2\(1a\) | |
Cisco Catalyst 6000 | =2.2\(1a\) | |
Cisco Catalyst 6500 | =3.1\(1a\) | |
Cisco Catalyst 6500 ws-x6380-nam | =3.1\(1a\) | |
Cisco Catalyst 6500 Wireless Services Module | =2.2\(1a\) | |
Cisco Catalyst 7600 Series | =3.1\(1a\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1257 has a critical severity rating due to its potential for remote command execution.
To fix CVE-2007-1257, you should upgrade to the latest software version provided by Cisco for the affected devices.
CVE-2007-1257 affects various Cisco Catalyst Series 6000, 6500, and 7600 models with the Network Analysis Module.
CVE-2007-1257 enables remote attackers to execute arbitrary commands on the affected Cisco devices via spoofed SNMP packets.
As of now, the recommended approach for CVE-2007-1257 is to apply the official software updates rather than relying on workarounds.