CVE-2008-3820
 
Severity Score
6.8
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cisco Security Manager 3.1 and 3.2 before 3.2.2, when Cisco IPS Event Viewer (IEV) is used, exposes TCP ports used by the MySQL daemon and IEV server, which allows remote attackers to obtain "root access" to IEV via unspecified use of TCP sessions to these ports.
Cisco Security Manager v3.1 y v3.2 antes de v3.2.2, cuando se usa Cisco IPS Event Viewer (IEV), expone los puertos TCP utilizados por el demonio de MySQL y el servidor IEV, lo que permite a atacantes remotos obtener "acceso de root" a IEV, mediante el uso de sesiones TCP sin especificar a estos puertos.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-08-27 CVE Reserved
- 2009-01-21 CVE Published
- 2023-06-11 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/33381 | Vdb Entry | |
http://www.securitytracker.com/id?1021619 | Vdb Entry | |
http://www.vupen.com/english/advisories/2009/0214 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48134 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6192a.shtml | 2017-08-08 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/33633 | 2017-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | * | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | 3.1 Search vendor "Cisco" for product "Security Manager" and version "3.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | 3.1.1 Search vendor "Cisco" for product "Security Manager" and version "3.1.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | 3.1.1 Search vendor "Cisco" for product "Security Manager" and version "3.1.1" | sp3 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | 3.2 Search vendor "Cisco" for product "Security Manager" and version "3.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | 3.2 Search vendor "Cisco" for product "Security Manager" and version "3.2" | sp2 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | 3.2.1 Search vendor "Cisco" for product "Security Manager" and version "3.2.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Manager Search vendor "Cisco" for product "Security Manager" | 3.2.1 Search vendor "Cisco" for product "Security Manager" and version "3.2.1" | sp1 |
Affected
|