Cisco IOS prior to 15.2(2)E1 on Catalyst switches allows remote malicious users to obtain potentially sensitive software-version information via a request to the Network Mobility Services Protocol (NMSP) port, aka Bug ID CSCum62591.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco ios 15.1\\(2\\)sg |
||
cisco ios 15.1\\(1\\)sg1 |
||
cisco ios 15.1\\(2\\)sy |
||
cisco ios 15.1\\(2\\)sg3 |
||
cisco ios 15.1\\(1\\)sy3 |
||
cisco ios 15.1\\(2\\)sy5 |
||
cisco ios 15.1\\(2\\)sg6 |
||
cisco ios 15.1\\(1\\)sy |
||
cisco ios 15.1\\(2\\)sy1 |
||
cisco ios 15.1\\(2\\)sy2 |
||
cisco ios 15.1\\(2\\)sy3 |
||
cisco ios 15.1\\(1\\)sy4 |
||
cisco ios 15.1\\(1\\)sy6 |
||
cisco ios 15.1\\(2\\)sy6 |
||
cisco ios 15.1\\(1\\)sg |
||
cisco ios 15.1\\(1\\)sy1 |
||
cisco ios 15.1\\(1\\)sy2 |
||
cisco ios 15.1\\(2\\)sg2 |
||
cisco ios 15.1\\(2\\)sy4 |
||
cisco ios 15.1\\(1\\)sy5 |
||
cisco ios 15.1\\(2\\)sy7 |
||
cisco ios 15.1\\(2\\)sy8 |
||
cisco ios 15.1\\(1\\)sg2 |
||
cisco ios 15.1\\(2\\)sg1 |
||
cisco ios 15.1\\(2\\)sg4 |
||
cisco ios 15.1\\(2\\)sg5 |
||
cisco ios 15.1\\(2\\)sy4a |
||
cisco ios 15.1\\(2\\)sg7 |