Vulnerabilities > CVE-2000-0945 - Unspecified vulnerability in Cisco Catalyst 3500 XL
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 1 |
Exploit-Db
description | Cisco Catalyst 3500 XL Remote Arbitrary Command Execution Vulnerability. CVE-2000-0945. Remote exploit for hardware platform |
id | EDB-ID:20330 |
last seen | 2016-02-02 |
modified | 2000-10-26 |
published | 2000-10-26 |
reporter | blackangels |
source | https://www.exploit-db.com/download/20330/ |
title | Cisco Catalyst 3500 XL Remote Arbitrary Command Execution Vulnerability |
Metasploit
description | This module gathers data from a Cisco device (router or switch) with the device manager web interface exposed. The HttpUsername and HttpPassword options can be used to specify authentication. |
id | MSF:AUXILIARY/SCANNER/HTTP/CISCO_DEVICE_MANAGER |
last seen | 2020-04-11 |
modified | 2018-10-16 |
published | 2010-12-11 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0945 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/cisco_device_manager.rb |
title | Cisco Device HTTP Device Manager Access |
Nessus
NASL family | CISCO |
NASL id | CISCO_CATALYST.NASL |
description | The remote device appears to be a Cisco Catalyst. It is possible to execute arbitrary commands on the router by requesting them via HTTP, as in : /exec/show/config/cr This command shows the configuration file, which contains passwords. A remote attacker could use this flaw to take control of the router. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10545 |
published | 2000-11-10 |
reporter | This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10545 |
title | Cisco Catalyst Web Interface Remote Command Execution |
code |
|
Saint
bid | 1846 |
description | Cisco IOS HTTP exec path command execution |
id | net_cisco_webcmd |
osvdb | 444 |
title | cisco_ios_http_exec |
type | remote |