Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-2282
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-26 Apr, 2007 | 19:19
Updated At-29 Jul, 2017 | 01:31

Cisco Network Services (CNS) NetFlow Collection Engine (NFC) before 6.0 has an nfcuser account with the default password nfcuser, which allows remote attackers to modify the product configuration and, when installed on Linux, obtain login access to the host operating system.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>1.0
cpe:2.3:a:cisco:netflow_collection_engine:1.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>2.0
cpe:2.3:a:cisco:netflow_collection_engine:2.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>3.0
cpe:2.3:a:cisco:netflow_collection_engine:3.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>3.5
cpe:2.3:a:cisco:netflow_collection_engine:3.5:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>3.6
cpe:2.3:a:cisco:netflow_collection_engine:3.6:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>4.0
cpe:2.3:a:cisco:netflow_collection_engine:4.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>5.0
cpe:2.3:a:cisco:netflow_collection_engine:5.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>netflow_collection_engine>>5.0.3
cpe:2.3:a:cisco:netflow_collection_engine:5.0.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

The vendor has addressed this issue through the update 6.0.0 of the NetFlow Collection Engine.

Vendor Statements

References
HyperlinkSourceResource
http://securitytracker.com/id?1017960cve@mitre.org
N/A
http://www.cisco.com/en/US/products/products_security_advisory09186a008082c520.shtmlcve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/127545cve@mitre.org
US Government Resource
http://www.osvdb.org/35524cve@mitre.org
N/A
http://www.securityfocus.com/bid/23647cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2007/1545cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/33861cve@mitre.org
N/A
Hyperlink: http://securitytracker.com/id?1017960
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.cisco.com/en/US/products/products_security_advisory09186a008082c520.shtml
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/127545
Source: cve@mitre.org
Resource:
US Government Resource
Hyperlink: http://www.osvdb.org/35524
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/23647
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1545
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/33861
Source: cve@mitre.org
Resource: N/A
Change History
0Changes found

Details not found