Vulnerabilities > CVE-2002-0109 - Unspecified vulnerability in Linksys Befn2Ps4, Befsr41 and Befsr81
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN linksys
nessus
Summary
Linksys EtherFast BEFN2PS4, BEFSR41, and BEFSR81 Routers, and possibly other products, allow remote attackers to gain sensitive information and cause a denial of service via an SNMP query for the default community string "public," which causes the router to change its configuration and send SNMP trap information back to the system that initiated the query.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 3 |
Nessus
NASL family | SNMP |
NASL id | SNMP_DEFAULT_COMMUNITIES.NASL |
description | It is possible to obtain the default community names of the remote SNMP server. An attacker can use this information to gain more knowledge about the remote host or to change the configuration of the remote system (if the default community allows such modifications). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10264 |
published | 2002-11-25 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10264 |
title | SNMP Agent Default Community Names |
References
- http://marc.info/?l=bugtraq&m=101039288111680&w=2
- http://marc.info/?l=bugtraq&m=101039288111680&w=2
- http://www.iss.net/security_center/static/7827.php
- http://www.iss.net/security_center/static/7827.php
- http://www.securityfocus.com/bid/3795
- http://www.securityfocus.com/bid/3795
- http://www.securityfocus.com/bid/3797
- http://www.securityfocus.com/bid/3797