VLAN418_RADI – 10.44.100.15

VLAN: 418CIDR: 10.44.100.0/22, 193.224.48.64/27, 192.9.200.0/24NAT: 193.224.49.26Nessus mappa: 1472
Scan: RADIDátum: 2026-01-30 16:08
Ollama alapú vezetői elemzés

A következők a legfontosabb ajánlások:

Összkép:
A Cisco eszközökön több kritikus és magas kockázati szintű hibát találtunk. Ezek között vannak biztonsági rések, amelyek lehetővé teszik az egyesített támadásokat, valamint a rendszerre történő bejutást.

Fő kockázati témák:
A Cisco eszközökön több kritikus és magas kockázati szintű hibát találtunk.
Ezek között vannak biztonsági rések, amelyek lehetővé teszik az egyesített támadásokat.

Ajánlott 0–7 nap:
A legfontosabb dolog a kritikus és magas kockázati szintű hibák gyors javítása. A Cisco eszközökön történő biztonsági frissítések elvégzése fontos, hogy megelőzzük az egyesített támadásokat.

Ajánlott 7–30 nap:
A rendszer szintű megelőzéshez javítsuk ki a biztonsági réseket és hajtsuk végre a hardening folyamatot.

Kritikus (3 típus / 3 összes)
  1. Cisco IOS Cluster Management Protocol Telnet Option Handling RCE (cisco-sa-20170317-cmp)
  2. Cisco IOS Software DHCP Remote Code Execution Vulnerability
  3. Cisco IOS Software Web Services Remote Code Execution (cisco-sa-http-code-exec-WmfP3h3O)
Magas (28 típus / 41 összes)
  1. SNMP Agent Default Community Name (public)
  2. Cisco IOS MPLS Forwarding Infrastructure Denial of Service Vulnerability - Cisco Systems
  3. Cisco IOS Software Multiple Features IP Sockets Vulnerability
  4. Cisco IOS Software Secure Copy Privilege Escalation Vulnerability - Cisco Systems
  5. Cisco IOS Software Multiple Features Crafted TCP Sequence Vulnerability - Cisco Systems
  6. Cisco IOS Software Multiple Features Crafted UDP Packet Vulnerability - Cisco Systems
  7. TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products - Cisco Systems
  8. Cisco IOS Software Authentication Proxy Vulnerability - Cisco Systems
  9. Cisco IOS Software Internet Key Exchange Resource Exhaustion Vulnerability - Cisco Systems
  10. Cisco IOS Software Tunnels Vulnerability - Cisco Systems
  11. Cisco IOS Software Multiprotocol Label Switching Packet Vulnerability (cisco-sa-20100324-ldp)
  12. Cisco IOS Software Multicast Source Discovery Protocol DoS (cisco-sa-20120328-msdp)
  13. Cisco IOS Software Command Security Bypass (cisco-sa-20120328-pai)
  14. Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20120926-dhcp)
  15. Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability (cisco-sa-20120926-dhcpv6)
  16. Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
  17. Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
  18. Cisco IOS Software Multiple Network Address Translation (NAT) Denial of Service Vulnerabilities (cisco-sa-20140326-nat)
  19. Cisco IOS Software RSVP DoS (cisco-sa-20140924-rsvp)
  20. Cisco IOS Smart Install Packet Image List Parameter Handling DoS (cisco-sa-20160323-smi)
  21. Cisco IOS IKEv1 Packet Handling Remote Information Disclosure (cisco-sa-20160916-ikev1) (BENIGNCERTAIN)
  22. Cisco IOS L2TP Parsing DoS (cisco-sa-20170322-l2tp)
  23. Cisco IOS Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities (cisco-sa-20180328-lldp)
  24. Cisco IOS Software DNS Forwarder Denial of Service Vulnerability (cisco-sa-20160928-dns)
  25. Cisco IOS DHCP Multiple Vulnerabilities
  26. Cisco IOS Software Cluster Management Protocol DoS Vulnerability (cisco-sa-20180926-cmp)
  27. Cisco IOS HTTP Client Information Disclosure Vulnerability (cisco-sa-20190925-http-client)
  28. Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Közepes (9 típus / 10 összes)
  1. Unencrypted Telnet Server
  2. OSPF LSA Manipulation Vulnerability in Cisco IOS (cisco-sa-20130801-lsaospf)
  3. SNMP 'GETBULK' Reflection DDoS
  4. Cisco IOS Zone-Based Firewall Feature Security Bypass (CSCun94946)
  5. Network Time Protocol (NTP) Mode 6 Scanner
  6. Cisco IOS Software Multiple Vulnerabilities in ntpd (cisco-sa-20150408-ntpd)
  7. Cisco IOS OSPF LSA Manipulation (cisco-sa-20170727-ospf)
  8. Cisco IOS Tcl DoS (cisco-sa-tcl-dos-MAZQUnMF)
  9. Cisco IOS and IOS XE Software Tcl Arbitrary Code Execution (cisco-sa-tcl-ace-C9KuVKmm)
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-30 17:56

CRITICAL (3)

Cisco IOS Cluster Management Protocol Telnet Option Handling RCE (cisco-sa-20170317-cmp)
Plugin ID: 97991 Port: tcp/161 CVE: CVE-2017-3881
According to its self-reported version and configuration, the Cisco IOS software running on the remote device is affected by a remote code execution vulnerability in the Cluster Management Protocol (CMP) subsystem due to improper handling of CMP-specific Telnet options. An unauthenticated, remote attacker can exploit this by establishing a Telnet session with malformed CMP-specific telnet options, to execute arbitrary code.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvd48893. Alternatively, as a workaround, disable the Telnet protocol for incoming connections.
Cisco IOS Software DHCP Remote Code Execution Vulnerability
Plugin ID: 103565 Port: tcp/0 CVE: CVE-2017-12240
According to its self-reported version, the IOS is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCsm45390 and CSCuw77959.
Cisco IOS Software Web Services Remote Code Execution (cisco-sa-http-code-exec-WmfP3h3O)
Plugin ID: 265975 Port: tcp/161 CVE: CVE-2025-20363
According to its self-reported version, Cisco IOS Software is affected by a web services remote code exeuction vulnerability: - A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web service on an affected device after obtaining additional information about the system, overcoming exploit mitigations, or both. A successful exploit could allow the attacker to execute arbitrary code as root, which may lead to the complete compromise of the affected device. (CVE-2025-20363) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwo35704

HIGH (41)

SNMP Agent Default Community Name (public)
Plugin ID: 41028 Port: udp/161 CVE: CVE-1999-0517
It is possible to obtain the default community name of the remote SNMP server. An attacker may use this information to gain more knowledge about the remote host, or to change the configuration of the remote system (if the default community allows such modifications).
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it. Either filter incoming UDP packets going to this port, or change the default community string.
Cisco IOS MPLS Forwarding Infrastructure Denial of Service Vulnerability - Cisco Systems
Plugin ID: 49022 Port: tcp/0 CVE: CVE-2008-3804
Cisco IOS Software Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) is vulnerable to a denial of service (DoS) attack from specially crafted packets. Only the MFI is affected by this vulnerability. Older Label Forwarding Information Base (LFIB) implementation, which is replaced by MFI, is not affected. Cisco has released free software updates that address this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20080924-mfi.
Cisco IOS Software Multiple Features IP Sockets Vulnerability
Plugin ID: 49030 Port: tcp/0 CVE: CVE-2009-0630
A vulnerability in the handling of IP sockets can cause devices to be vulnerable to a denial of service attack when any of several features of Cisco IOS Software are enabled. A sequence of specially crafted TCP/IP packets could cause any of the following results: Cisco has released free software updates that address this vulnerability. Several mitigation strategies are outlined in the "Workarounds" section of this advisory.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090325-ip.
Cisco IOS Software Secure Copy Privilege Escalation Vulnerability - Cisco Systems
Plugin ID: 49032 Port: tcp/0 CVE: CVE-2009-0637
The server side of the Secure Copy (SCP) implementation in Cisco IOS software contains a vulnerability that could allow authenticated users with an attached command-line interface (CLI) view to transfer files to and from a Cisco IOS device that is configured to be an SCP server, regardless of what users are authorized to do, per the CLI view configuration. This vulnerability could allow valid users to retrieve or write to any file on the device's file system, including the device's saved configuration and Cisco IOS image files, even if the CLI view attached to the user does not allow it. This configuration file may include passwords or other sensitive information. The Cisco IOS SCP server is an optional service that is disabled by default. CLI views are a fundamental component of the Cisco IOS Role-Based CLI Access feature, which is also disabled by default. Devices that are not specifically configured to enable the Cisco IOS SCP server, or that are configured to use it but do not use role-based CLI access, are not affected by this vulnerability. This vulnerability does not apply to the Cisco IOS SCP client feature. Cisco has released free software updates that address this vulnerability. There are no workarounds available for this vulnerability apart from disabling either the SCP server or the CLI view feature if these services are not required by administrators.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090325-scp.
Cisco IOS Software Multiple Features Crafted TCP Sequence Vulnerability - Cisco Systems
Plugin ID: 49034 Port: tcp/0 CVE: CVE-2009-0629
Cisco IOS Software contains a vulnerability in multiple features that could allow an attacker to cause a denial of service (DoS) condition on the affected device. A sequence of specially crafted TCP packets can cause the vulnerable device to reload. Cisco has released free software updates that address this vulnerability. Several mitigation strategies are outlined in the workarounds section of this advisory.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090325-tcp.
Cisco IOS Software Multiple Features Crafted UDP Packet Vulnerability - Cisco Systems
Plugin ID: 49035 Port: tcp/0 CVE: CVE-2009-0631
Several features within Cisco IOS Software are affected by a crafted UDP packet vulnerability. If any of the affected features are enabled, a successful attack will result in a blocked input queue on the inbound interface. Only crafted UDP packets destined for the device could result in the interface being blocked. Transit traffic will not block the interface. Cisco has released free software updates that address this vulnerability and workarounds that mitigate this vulnerability are available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090325-udp.
TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products - Cisco Systems
Plugin ID: 49038 Port: tcp/0 CVE: CVE-2008-4609
Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system. In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities. Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090908-tcp24.
TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products - Cisco Systems
Plugin ID: 49038 Port: tcp/0 CVE: CVE-2009-0627
Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system. In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities. Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090908-tcp24.
Cisco IOS Software Authentication Proxy Vulnerability - Cisco Systems
Plugin ID: 49040 Port: tcp/0 CVE: CVE-2009-2863
Cisco IOS Software configured with Authentication Proxy for HTTP(S), Web Authentication or the consent feature, contains a vulnerability that may allow an unauthenticated session to bypass the authentication proxy server or bypass the consent webpage. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090923-auth-proxy.
Cisco IOS Software Internet Key Exchange Resource Exhaustion Vulnerability - Cisco Systems
Plugin ID: 49044 Port: tcp/0 CVE: CVE-2009-2868
Cisco IOS devices that are configured for Internet Key Exchange (IKE) protocol and certificate based authentication are vulnerable to a resource exhaustion attack. Successful exploitation of this vulnerability may result in the allocation of all available Phase 1 security associations (SA) and prevent the establishment of new IPsec sessions. Cisco has released free software updates that address this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090923-ipsec.
Cisco IOS Software Tunnels Vulnerability - Cisco Systems
Plugin ID: 49048 Port: tcp/0 CVE: CVE-2009-2872
Cisco devices running affected versions of Cisco IOS Software are vulnerable to a denial of service (DoS) attack if configured for IP tunnels and Cisco Express Forwarding. Cisco has released free software updates that address this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090923-tunnels.
Cisco IOS Software Tunnels Vulnerability - Cisco Systems
Plugin ID: 49048 Port: tcp/0 CVE: CVE-2009-2873
Cisco devices running affected versions of Cisco IOS Software are vulnerable to a denial of service (DoS) attack if configured for IP tunnels and Cisco Express Forwarding. Cisco has released free software updates that address this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20090923-tunnels.
Cisco IOS Software Multiprotocol Label Switching Packet Vulnerability (cisco-sa-20100324-ldp)
Plugin ID: 49052 Port: tcp/0 CVE: CVE-2010-0576
A device running Cisco IOS Software, Cisco IOS XE Software, or Cisco IOS XR Software is vulnerable to a remote denial of service (DoS) condition if it is configured for Multiprotocol Label Switching (MPLS) and has support for Label Distribution Protocol (LDP). A crafted LDP UDP packet can cause an affected device running Cisco IOS Software or Cisco IOS XE Software to reload. On devices running affected versions of Cisco IOS XR Software, such packets can cause the device to restart the mpls_ldp process. A system is vulnerable if configured with either LDP or Tag Distribution Protocol (TDP). Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20100324-ldp.
Cisco IOS Software Multicast Source Discovery Protocol DoS (cisco-sa-20120328-msdp)
Plugin ID: 58568 Port: tcp/0 CVE: CVE-2012-0382
According to its self-reported version number, the remote Cisco IOS device is affected by a denial of service vulnerability in the Multicast Source Discovery Protocol (MSDP) implementation. An unauthenticated, remote attacker can exploit this, via an MSDP packet containing encapsulated IGMP data, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco Security Advisory cisco-sa-20120328-msdp. Alternatively, apply the workarounds detailed in the vendor advisory.
Cisco IOS Software Command Security Bypass (cisco-sa-20120328-pai)
Plugin ID: 58570 Port: tcp/0 CVE: CVE-2012-0384
According to its self-reported version and configuration, the Cisco IOS software running on the remote device is affected by a security bypass vulnerability in the Authentication, Authorization, and Accounting (AAA) feature. An authenticated, remote attacker can exploit this, via an HTTP or HTTPS session, to bypass access restrictions and execute any IOS command that is configured for the authorization level. This vulnerability requires that the HTTP or HTTPS server is enabled on the Cisco IOS device.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20120328-pai. Alternatively, the HTTP server may be disabled as a workaround.
Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20120926-dhcp)
Plugin ID: 62372 Port: tcp/0 CVE: CVE-2012-4621
Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. An attacker could exploit this vulnerability by sending a single DHCP packet to or through an affected device, causing the device to reload. Cisco has released free software updates that address this vulnerability. A workaround that mitigates this vulnerability is available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20120926-dhcp.
Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability (cisco-sa-20120926-dhcpv6)
Plugin ID: 62373 Port: tcp/0 CVE: CVE-2012-4623
Cisco IOS Software and Cisco IOS XE Software contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. An attacker could exploit this vulnerability by sending a crafted request to an affected device that has the DHCP version 6 (DHCPv6) server feature enabled, causing a reload. Cisco has released free software updates that address this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20120926-dhcpv6.
Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
Plugin ID: 70316 Port: tcp/0 CVE: CVE-2013-5475
A vulnerability exists in the DHCP implementation of Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability occurs during the parsing of crafted DHCP packets. An attacker could exploit this vulnerability by sending crafted DHCP packets to an affected device that has the DHCP server or DHCP relay feature enabled. An exploit could allow the attacker to cause a reload of an affected device. Cisco has released free software updates that address this vulnerability. There are no workarounds to this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20130925-dhcp.
Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
Plugin ID: 70322 Port: tcp/0 CVE: CVE-2013-5472
A vulnerability in the implementation of the Network Time Protocol (NTP) feature in Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of multicast NTP packets that are sent to an affected device encapsulated in a Multicast Source Discovery Protocol (MSDP) Source-Active (SA) message from a configured MSDP peer. An attacker could exploit this vulnerability by sending multicast NTP packets to an affected device. Repeated exploitation could result in a sustained DoS condition. Cisco has released free software updates that address this vulnerability. A workaround is available to mitigate this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20130925-ntp.
Cisco IOS Software Multiple Network Address Translation (NAT) Denial of Service Vulnerabilities (cisco-sa-20140326-nat)
Plugin ID: 73345 Port: tcp/0 CVE: CVE-2014-2109
According to its self-reported version, the version of Cisco IOS running on the remote host is affected by multiple denial of service vulnerabilities in the Network Address Translation (NAT) implementation : - An issue exists in the TCP Input module due to the improper handling of certain sequences of TCP packets. An unauthenticated, remote attacker could potentially exploit this issue by sending a specific sequence of IPv4 TCP packets resulting in a denial of service. (CVE-2014-2109) - An issue exists in the Application Layer Gateway (ALG) module due to the improper handling of malformed DNS packets during the NAT procedure. An unauthenticated, remote attacker could potentially exploit this issue by sending malformed IPv4 DNS packets resulting in a denial of service. (CVE-2014-2111) Note that IPv6 packets cannot be used to exploit these issues.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20140326-nat.
Cisco IOS Software Multiple Network Address Translation (NAT) Denial of Service Vulnerabilities (cisco-sa-20140326-nat)
Plugin ID: 73345 Port: tcp/0 CVE: CVE-2014-2111
According to its self-reported version, the version of Cisco IOS running on the remote host is affected by multiple denial of service vulnerabilities in the Network Address Translation (NAT) implementation : - An issue exists in the TCP Input module due to the improper handling of certain sequences of TCP packets. An unauthenticated, remote attacker could potentially exploit this issue by sending a specific sequence of IPv4 TCP packets resulting in a denial of service. (CVE-2014-2109) - An issue exists in the Application Layer Gateway (ALG) module due to the improper handling of malformed DNS packets during the NAT procedure. An unauthenticated, remote attacker could potentially exploit this issue by sending malformed IPv4 DNS packets resulting in a denial of service. (CVE-2014-2111) Note that IPv6 packets cannot be used to exploit these issues.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20140326-nat.
Cisco IOS Software RSVP DoS (cisco-sa-20140924-rsvp)
Plugin ID: 78035 Port: tcp/0 CVE: CVE-2014-3354
According to its self-reported version, the version of Cisco IOS running on the remote host is affected by a denial of service vulnerability in the Resource Reservation Protocol (RSVP) implementation due to improper handling of RSVP packets. A remote attacker can exploit this issue by sending specially crafted RSVP packets to cause the device to reload.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20140924-rsvp.
Cisco IOS Smart Install Packet Image List Parameter Handling DoS (cisco-sa-20160323-smi)
Plugin ID: 90358 Port: tcp/0 CVE: CVE-2016-1349
According to its self-reported version, the Cisco IOS software running on the remote device is affected by a denial of service vulnerability in the Smart Install client feature due to improper handling of image list parameters. An unauthenticated, remote attacker can exploit this issue, via crafted Smart Install packets, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCuv45410. Alternatively, disable the Smart Install feature per the vendor advisory.
Cisco IOS IKEv1 Packet Handling Remote Information Disclosure (cisco-sa-20160916-ikev1) (BENIGNCERTAIN)
Plugin ID: 93736 Port: tcp/0 CVE: CVE-2016-6415
According to its self-reported version and configuration, the Cisco IOS software running on the remote device is affected by an information disclosure vulnerability, known as BENIGNCERTAIN, in the Internet Key Exchange version 1 (IKEv1) subsystem due to improper handling of IKEv1 security negotiation requests. An unauthenticated, remote attacker can exploit this issue, via a specially crafted IKEv1 packet, to disclose memory contents, resulting in the disclosure of confidential information including credentials and configuration settings. BENIGNCERTAIN is one of multiple Equation Group vulnerabilities and exploits disclosed on 2016/08/14 by a group known as the Shadow Brokers.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvb29204.
Cisco IOS L2TP Parsing DoS (cisco-sa-20170322-l2tp)
Plugin ID: 99028 Port: tcp/0 CVE: CVE-2017-3857
According to its self-reported version, the Cisco IOS software running on the remote device is affected by a denial of service vulnerability in its Layer 2 Tunneling Protocol (L2TP) parsing function due to insufficient validation of L2TP packets. An unauthenticated, remote attacker can exploit this issue, via a specially crafted L2TP packet, to cause the device to reload. Note that this issue only affects devices if the L2TP feature is enabled and the device is configured as an L2TP Version 2 (L2TPv2) or L2TP Version 3 (L2TPv3) endpoint. By default, the L2TP feature is not enabled.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCuy82078.
Cisco IOS Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities (cisco-sa-20180328-lldp)
Plugin ID: 108880 Port: tcp/161 CVE: CVE-2018-0167
According to its self-reported version, the IOS is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCvd73487 and CSCvd73664.
Cisco IOS Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities (cisco-sa-20180328-lldp)
Plugin ID: 108880 Port: tcp/161 CVE: CVE-2018-0175
According to its self-reported version, the IOS is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCvd73487 and CSCvd73664.
Cisco IOS Software DNS Forwarder Denial of Service Vulnerability (cisco-sa-20160928-dns)
Plugin ID: 108956 Port: tcp/0 CVE: CVE-2016-6380
According to its self-reported version, the IOS is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCup90532.
Cisco IOS DHCP Multiple Vulnerabilities
Plugin ID: 109087 Port: tcp/161 CVE: CVE-2018-0172
According to its self-reported version, the Cisco IOS software running on the remote device is affected by multiple denial of service vulnerabilities in the DHCP client implementation when parsing DHCP packets. An unauthenticated, remote attacker can exploit these issues, via specially crafted DHCP packets, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvg62730, CSCvg62754, and CSCuh91645.
Cisco IOS DHCP Multiple Vulnerabilities
Plugin ID: 109087 Port: tcp/161 CVE: CVE-2018-0173
According to its self-reported version, the Cisco IOS software running on the remote device is affected by multiple denial of service vulnerabilities in the DHCP client implementation when parsing DHCP packets. An unauthenticated, remote attacker can exploit these issues, via specially crafted DHCP packets, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvg62730, CSCvg62754, and CSCuh91645.
Cisco IOS DHCP Multiple Vulnerabilities
Plugin ID: 109087 Port: tcp/161 CVE: CVE-2018-0174
According to its self-reported version, the Cisco IOS software running on the remote device is affected by multiple denial of service vulnerabilities in the DHCP client implementation when parsing DHCP packets. An unauthenticated, remote attacker can exploit these issues, via specially crafted DHCP packets, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvg62730, CSCvg62754, and CSCuh91645.
Cisco IOS Software Cluster Management Protocol DoS Vulnerability (cisco-sa-20180926-cmp)
Plugin ID: 117944 Port: tcp/161 CVE: CVE-2018-0475
According to its self-reported version, the IOS is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCvg48576.
Cisco IOS HTTP Client Information Disclosure Vulnerability (cisco-sa-20190925-http-client)
Plugin ID: 129778 Port: tcp/161 CVE: CVE-2019-12665
According to its self-reported version, IOS is affected by a vulnerability in the HTTP client feature that allows an unauthenticated, remote attacker to read and modify data that should normally be sent via an encrypted channel. This vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker can exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been set through an encrypted channel. Please see the included Cisco BIDs and Cisco Security Advisory for more information. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvf36258
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20169
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20170
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20171
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20172
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20173
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20174
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20175
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Plugin ID: 215126 Port: tcp/161 CVE: CVE-2025-20176
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities. - A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176) - A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. (CVE-2025-20172) Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577, CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493

MEDIUM (10)

Unencrypted Telnet Server
Plugin ID: 42263 Port: tcp/23
The remote host is running a Telnet server over an unencrypted channel. Using Telnet over an unencrypted channel is not recommended as logins, passwords, and commands are transferred in cleartext. This allows a remote, man-in-the-middle attacker to eavesdrop on a Telnet session to obtain credentials or other sensitive information and to modify traffic exchanged between a client and server. SSH is preferred over Telnet since it protects credentials from eavesdropping and can tunnel additional data streams such as an X11 session.
Javasolt megoldás
Disable the Telnet service and use SSH instead.
OSPF LSA Manipulation Vulnerability in Cisco IOS (cisco-sa-20130801-lsaospf)
Plugin ID: 69377 Port: tcp/0 CVE: CVE-2013-0149
The remote Cisco IOS device is affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could be exploited by injecting specially crafted OSPF packets. Successful exploitation could allow an unauthenticated attacker to manipulate or disrupt the flow of network traffic through the device.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20130801-lsaospf.
SNMP 'GETBULK' Reflection DDoS
Plugin ID: 76474 Port: udp/161 CVE: CVE-2008-4309
The remote SNMP daemon is responding with a large amount of data to a 'GETBULK' request with a larger than normal value for 'max-repetitions'. A remote attacker can use this SNMP server to conduct a reflected distributed denial of service attack on an arbitrary remote host.
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it. Otherwise, restrict and monitor access to this service, and consider changing the default 'public' community string.
Cisco IOS Zone-Based Firewall Feature Security Bypass (CSCun94946)
Plugin ID: 91854 Port: tcp/0 CVE: CVE-2014-2146
According to its self-reported version, the Cisco IOS software running on the remote device is affected by a security bypass vulnerability in the Zone-Based Firewall feature due to insufficient zone checking for traffic belonging to existing sessions. An unauthenticated, remote attacker can exploit this, by injecting spoofed traffic that matches existing connections, to bypass security access restrictions on the device and gain access to resources.
Javasolt megoldás
Apply the relevant patch referenced in the Cisco security advisory. Alternatively, disable the Zone-Based Firewall feature according to the vendor advisory.
Network Time Protocol (NTP) Mode 6 Scanner
Plugin ID: 97861 Port: udp/123
The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.
Javasolt megoldás
Restrict NTP mode 6 queries.
Cisco IOS Software Multiple Vulnerabilities in ntpd (cisco-sa-20150408-ntpd)
Plugin ID: 108954 Port: tcp/0 CVE: CVE-2015-1798
According to its self-reported version, the IOS is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCut77619.
Cisco IOS Software Multiple Vulnerabilities in ntpd (cisco-sa-20150408-ntpd)
Plugin ID: 108954 Port: tcp/0 CVE: CVE-2015-1799
According to its self-reported version, the IOS is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCut77619.
Cisco IOS OSPF LSA Manipulation (cisco-sa-20170727-ospf)
Plugin ID: 131394 Port: tcp/161 CVE: CVE-2017-6770
According to its self-reported version, Cisco IOS is affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. An unauthenticated, remote attacker can exploit this, by injecting crafted OSPF LSA type 1 packets, to cause the targeted router to flush its routing table and propagate the crafted OSPF LSA type 1 update through the OSPF AS domain, allowing the attacker to intercept or black-hole traffic. Successful exploitation of this vulnerability requires that an attacker first accurately determine certain parameters within the LSA database on the target router. Please see the included Cisco BIDs and Cisco Security Advisory for more information. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCva74756.
Cisco IOS Tcl DoS (cisco-sa-tcl-dos-MAZQUnMF)
Plugin ID: 137407 Port: tcp/161 CVE: CVE-2020-3201
According to its self-reported version, IOS is affected by a vulnerability in the Tool Command Line (Tcl) interpreter due to insufficient input validation of data passed to the Tcl interpreter. An authenticated, unprivileged, and local attacker can exploit this, by executing crafted Tcl arguments on an affected device, in order to cause a denial of service (DoS) condition on an affected system. Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvq28110
Cisco IOS and IOS XE Software Tcl Arbitrary Code Execution (cisco-sa-tcl-ace-C9KuVKmm)
Plugin ID: 137630 Port: tcp/161 CVE: CVE-2020-3204
According to its self-reported version, IOS is affected by a Arbitrary Code Execution vulnerability. An authenticated, local attacker with privileged EXEC credentials to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. A successful exploit could allow the attacker to cause memory corruption or execute the code with root privileges on the underlying OS of the affected device. Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvq05584

LOW (2)

ICMP Timestamp Request Remote Date Disclosure
Plugin ID: 10114 Port: icmp/0 CVE: CVE-1999-0524
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
SNMP Request Cisco Router Information Disclosure
Plugin ID: 10969 Port: udp/161
It is possible to determine the model of the remote CISCO system by sending SNMP requests with the OID 1.3.6.1.4.1.9.1. An attacker may use this information to gain more knowledge about the remote host.
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port.