First published: Fri Jul 15 2016(Updated: )
Cisco ASR 5000 devices with software 18.3 through 20.0.0 allow remote attackers to make configuration changes over SNMP by leveraging knowledge of the read-write community, aka Bug ID CSCuz29526.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 5000 firmware | ||
Cisco ASR 5000 Software | =18.3.0 | |
Cisco ASR 5000 Software | =18.3_base | |
Cisco ASR 5000 Software | =19.0.1 | |
Cisco ASR 5000 Software | =19.0.m0.60737 | |
Cisco ASR 5000 Software | =19.0.m0.60828 | |
Cisco ASR 5000 Software | =19.0.m0.61045 | |
Cisco ASR 5000 Software | =19.1.0 | |
Cisco ASR 5000 Software | =19.1.0.61559 | |
Cisco ASR 5000 Software | =19.2.0 | |
Cisco ASR 5000 Software | =19.3.0 | |
Cisco ASR 5000 Software | =20.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1452 has been assigned a medium severity rating due to its potential impact on device configuration.
To mitigate CVE-2016-1452, ensure that SNMP read-write community strings are changed to strong, unique values and restrict SNMP access to trusted hosts.
CVE-2016-1452 affects Cisco ASR 5000 devices running software versions 18.3 through 20.0.0.
Yes, CVE-2016-1452 can be exploited remotely by attackers who know the read-write community string.
CVE-2016-1452 enables remote attackers to make unauthorized configuration changes over SNMP.