ID

VAR-200108-0111


CVE

CVE-2001-0711


TITLE

Cisco IOS ILMI SNMP Community String Vulnerability

Trust: 0.9

sources: BID: 2427 // CNNVD: CNNVD-200108-159

DESCRIPTION

Cisco IOS 11.x and 12.0 with ATM support allows attackers to cause a denial of service via the undocumented Interim Local Management Interface (ILMI) SNMP community string. There is a vulnerability in the remote management architecture for Asynchronous Transfer Mode (ATM) networking devices that permits unauthorized access to configuration information. An attacker who gains access to an affected device can read and modify its configuration, creating a denial-of-service condition, an information leak, or both. IOS is the operating system designed for various Cisco devices. It is maintained and distributed by Cisco systems. A problem in the versions of IOS 11.x and 12.0 could allow unauthorized access to certain configuration variables within a Cisco device. The ILMI SNMP Community string allows read and write access to system objects in the MIB-II community group. These configuration parameters do not affect the normal operation of the device, although if changed, can cause confusion or lead to a social engineering attack. It is possible for a malicious remote user to change configuration objects within the MIB-II Community, and rename the system, change the location name in the system, and/or the contact information for the system. This vulnerability affects only certain devices. There is a loophole in the SNMP implementation of IOS 11.x to 12.0 software, and remote attackers may use this loophole to obtain illegal access to the system

Trust: 2.7

sources: NVD: CVE-2001-0711 // CERT/CC: VU#976280 // JVNDB: JVNDB-2001-000033 // BID: 2427 // VULHUB: VHN-3520

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:11

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:11.3

Trust: 1.1

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 1.1

vendor:ciscomodel:iosscope:eqversion:11.0

Trust: 1.1

vendor:3 commodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.8

vendor:ciscomodel:ios 11.2 xascope: - version: -

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.0xv

Trust: 0.3

vendor:ciscomodel:ios 12.0xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0w5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0scscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3wa4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3nascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3mascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3aascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3 xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2wa3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2pscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2gsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1iascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1ctscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1ccscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1cascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1aascope: - version: -

Trust: 0.3

sources: CERT/CC: VU#976280 // BID: 2427 // JVNDB: JVNDB-2001-000033 // CNNVD: CNNVD-200108-159 // NVD: CVE-2001-0711

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0711
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#976280
value: 54.68

Trust: 0.8

NVD: CVE-2001-0711
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200108-159
value: MEDIUM

Trust: 0.6

VULHUB: VHN-3520
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-0711
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-3520
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#976280 // VULHUB: VHN-3520 // JVNDB: JVNDB-2001-000033 // CNNVD: CNNVD-200108-159 // NVD: CVE-2001-0711

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0711

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200108-159

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200108-159

CONFIGURATIONS

sources: JVNDB: JVNDB-2001-000033

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-3520

PATCH

title:ios-snmp-ilmi-vuln-puburl:http://www.cisco.com/warp/public/707/ios-snmp-ilmi-vuln-pub.shtml

Trust: 0.8

title:2001-03-17-00url:http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/ios-snmp-ilmi-vuln-pub-j.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2001-000033

EXTERNAL IDS

db:NVDid:CVE-2001-0711

Trust: 2.8

db:BIDid:2427

Trust: 2.0

db:CERT/CCid:VU#976280

Trust: 0.8

db:JVNDBid:JVNDB-2001-000033

Trust: 0.8

db:CNNVDid:CNNVD-200108-159

Trust: 0.7

db:XFid:6169

Trust: 0.6

db:CISCOid:20010207 CISCO IOS SOFTWARE SNMP READ-WRITE ILMI COMMUNITY STRING VULNERABILITY

Trust: 0.6

db:EXPLOIT-DBid:20652

Trust: 0.1

db:SEEBUGid:SSVID-74521

Trust: 0.1

db:VULHUBid:VHN-3520

Trust: 0.1

sources: CERT/CC: VU#976280 // VULHUB: VHN-3520 // BID: 2427 // JVNDB: JVNDB-2001-000033 // CNNVD: CNNVD-200108-159 // NVD: CVE-2001-0711

REFERENCES

url:http://www.cisco.com/warp/public/707/ios-snmp-ilmi-vuln-pub.shtml

Trust: 2.5

url:http://www.securityfocus.com/bid/2427

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/6169

Trust: 1.1

url:http://www.cisco.com/univercd/cc/td/doc/product/wanbu/8850r2/rel201/pnni/objects.htm

Trust: 0.8

url:http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/ios113p/113tcavs.htm

Trust: 0.8

url:http://www.protocols.com/pbook/ilmi.htm

Trust: 0.8

url:http://www.atmdigest.com/pnni.htm

Trust: 0.8

url:http://www.ncne.nlanr.net/news/workshop/vbns-techs2/talks/mheld/

Trust: 0.8

url:http://cell-relay.indiana.edu/cell-relay/faq/dictionary/i/ilmi.html

Trust: 0.8

url:http://www-comm.itsi.disa.mil/atmf/pnni.html

Trust: 0.8

url:ftp://ftp.atmforum.com/pub/approved-specs/af-ilmi-0065.000.pdf

Trust: 0.8

url:ftp://ftp.atmforum.com/pub/approved-specs/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0711

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0711

Trust: 0.8

url:http://xforce.iss.net/static/6169.php

Trust: 0.6

sources: CERT/CC: VU#976280 // VULHUB: VHN-3520 // JVNDB: JVNDB-2001-000033 // CNNVD: CNNVD-200108-159 // NVD: CVE-2001-0711

CREDITS

Cisco Security Advisory

Trust: 0.6

sources: CNNVD: CNNVD-200108-159

SOURCES

db:CERT/CCid:VU#976280
db:VULHUBid:VHN-3520
db:BIDid:2427
db:JVNDBid:JVNDB-2001-000033
db:CNNVDid:CNNVD-200108-159
db:NVDid:CVE-2001-0711

LAST UPDATE DATE

2024-08-14T14:23:16.634000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#976280date:2002-03-05T00:00:00
db:VULHUBid:VHN-3520date:2017-12-19T00:00:00
db:BIDid:2427date:2009-07-11T04:46:00
db:JVNDBid:JVNDB-2001-000033date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200108-159date:2005-10-20T00:00:00
db:NVDid:CVE-2001-0711date:2017-12-19T02:29:26.113

SOURCES RELEASE DATE

db:CERT/CCid:VU#976280date:2001-05-01T00:00:00
db:VULHUBid:VHN-3520date:2001-08-31T00:00:00
db:BIDid:2427date:2001-02-27T00:00:00
db:JVNDBid:JVNDB-2001-000033date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200108-159date:2001-03-09T00:00:00
db:NVDid:CVE-2001-0711date:2001-08-31T04:00:00