Vulnerabilities > CVE-2001-0380 - Remote Security vulnerability in Xlt-F

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
crosscom-olicom
nessus
exploit available

Summary

Crosscom/Olicom XLT-F running XL 80 IM Version 5.5 Build Level 2 allows a remote attacker SNMP read and write access via a default, undocumented community string 'ILMI'.

Vulnerable Configurations

Part Description Count
Hardware
Crosscom_Olicom
1

Exploit-Db

descriptionOlicom XLT-F XL 80 IM V5.5BL2 Undocumented Community String Vulnerability. CVE-2001-0380. Remote exploit for hardware platform
idEDB-ID:20892
last seen2016-02-02
modified2001-03-25
published2001-03-25
reporterJacek Lipkowski
sourcehttps://www.exploit-db.com/download/20892/
titleOlicom XLT-F XL 80 IM V5.5BL2 - Undocumented Community String Vulnerability

Nessus

NASL familySNMP
NASL idSNMP_DEFAULT_COMMUNITIES.NASL
descriptionIt is possible to obtain the default community names of the remote SNMP server. An attacker can use this information to gain more knowledge about the remote host or to change the configuration of the remote system (if the default community allows such modifications).
last seen2020-06-01
modified2020-06-02
plugin id10264
published2002-11-25
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10264
titleSNMP Agent Default Community Names

Oval

accepted2008-09-08T04:00:39.767-04:00
classvulnerability
contributors
nameYuzheng Zhou
organizationHewlett-Packard
descriptionCrosscom/Olicom XLT-F running XL 80 IM Version 5.5 Build Level 2 allows a remote attacker SNMP read and write access via a default, undocumented community string 'ILMI'.
familyios
idoval:org.mitre.oval:def:5718
statusaccepted
submitted2008-05-02T11:06:36.000-04:00
titleCisco IOS ILMI SNMP Community String Vulnerability
version3