Vulnerability Name:

CVE-2003-0216 (CCN-11935)

Assigned:2003-04-24
Published:2003-04-24
Updated:2008-09-10
Summary:Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-287
CWE-noinfo
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2003-0216

Source: CCN
Type: Cisco Systems Inc. Security Advisory, 2003 April 24 08:00 (GMT)
Cisco Catalyst Enable Password Bypass Vulnerability

Source: CISCO
Type: UNKNOWN
20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability

Source: CCN
Type: US-CERT VU#443257
Cisco Catalyst switches allow access to enable mode without password

Source: CERT-VN
Type: US Government Resource
VU#443257

Source: CCN
Type: OSVDB ID: 8903
Cisco Catalyst Enable Access Authentication Bypass

Source: CCN
Type: BID-7424
Cisco Catalyst CatOS Authentication Bypass Vulnerability

Source: XF
Type: UNKNOWN
cisco-catalyst-bypass-password(11935)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:catos:7.5(1):*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:cisco:catalyst_4000:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_6000:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst:6500:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:catos:7.5(1):*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco catos 7.5(1)
    cisco catalyst 4000 *
    cisco catalyst 6000 *
    cisco catalyst 6500
    cisco catos 7.5(1)