Alcatel OmniSwitch 7700/7800 switches running AOS 5.1.1 contains a back door telnet server that was intended for development but not removed before distribution, which allows remote attackers to gain administrative privileges.
References
Link | Resource |
---|---|
http://www.cert.org/advisories/CA-2002-32.html | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/181721 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6220 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10664 | |
http://www.cert.org/advisories/CA-2002-32.html | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/181721 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6220 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10664 |
Configurations
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.cert.org/advisories/CA-2002-32.html - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/181721 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/6220 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/10664 - |
Information
Published : 2002-12-11 05:00
Updated : 2024-11-20 23:40
NVD link : CVE-2002-1272
Mitre link : CVE-2002-1272
CVE.ORG link : CVE-2002-1272
JSON object : View
Products Affected
alcatel
- aos
CWE