Vulnerability Note VU#472412

Cisco Catalyst Systems with a NAM may allow system access via spoofing the SNMP communication

Original Release date: 02 Mar 2007 | Last revised: 22 Mar 2007


A vulnerabilty in Cisco Catalyst Systems that have a Network Analysis Module (NAM) installed may allow a remote, unauthenticated attacker to gain complete control of this device.


Cisco Catalyst 6000, 6500, and Cisco 7600 series switches may utilize Cisco's NAM to monitor and analyze network traffic using Management Information Bases (MIBs). Cisco Catalyst 6000, 6500 and Cisco 7600 series switches that have a NAM installed contain a vulnerability in the way SNMP packets are handled. According to Cisco Security Advisory: cisco-sa-20070228-nam:

    NAMs communicate with the Catalyst system by using the Simple Network Management Protocol (SNMP). By spoofing the SNMP communication between the Catalyst system and the NAM an attacker may obtain complete control of the Catalyst system.

Note that only Cisco Catalyst 6000, 6500 and Cisco 7600 series systems with a NAM on them are affected by this issue. According to Cisco, none of their other products, including the Network Analysis Modules for Cisco Branch Routers (NM-NAM), are affected by this issue .


By successfully exploiting this vulnerability, an attacker may gain complete control of the device.


See the Software Version and Fixes section of Cisco Security Advisory: cisco-sa-20070228-nam for information on available upgrades.

Filter SNMP traffic

This vulnerability can be mitigated by filtering SNMP traffic from the IP address of the NAM to an affected device. Filters cannot be applied to the affected device itself; to be effective, they must be applied to systems that are deployed in front of it.

Apply an access control list

Users that are unable to upgrade should apply an access control list (ACL) on the vulnerable device to restrict access to trusted management systems. Details on creating and uploading an ACL can be found in Cisco's Protecting Your Core document.

More details on these and additional workarounds can be found in the Cisco Applied Intelligence companion document for this advisory.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Cisco Systems, Inc.Affected-02 Mar 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerabilty was reported in Cisco Security Advisory: cisco-sa-20070228-nam.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: Unknown
  • Date Public: 28 Feb 2007
  • Date First Published: 02 Mar 2007
  • Date Last Updated: 22 Mar 2007
  • Severity Metric: 9.37
  • Document Revision: 20


If you have feedback, comments, or additional information about this vulnerability, please send us email.