📄 1250.txt
字号:
Rule:--Sid:1250--Summary:Attack on Cisco router/switch web interface--Impact:Unauthorized administrative access to Cisco devices running vulnerable versions of IOS (router/switch operating system)--Detailed Information:Cisco routers and switches running vulnerable IOS versions can be attacked simply by typing in a URL, giving the attacker administrative access to the device. The device must be running the web configuration interface, a web server that enables a user to configure the device via a web browser.--Affected Systems:Cisco routers and switches running affected versions of IOS and whose web management interface is enabled. See http://www.securityfocus.com/bid/2936 --Attack Scenarios:Attacker identifies http server running on Cisco switch or router. Attacker then makes an http connection with the particular URL required to gain administrative control.--Ease of Attack:Simple. Web request, no exploit software needed.--False Positives:Legitimate access to the configuration manager will generate an event.--False Negatives:None known.--Corrective Action:Upgrade IOS to the latest non-affected version.Apply the appropriate vendor supplied PatchesDisable the web configuration interface.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by James Affeld <jamesaffeld@yahoo.com>-- Additional References:Bugtraq:http://www.securityfocus.com/bid/2936--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -