TopVuln

High-risk vulnerability digests

CVE-2011-2738

  • CRITICAL

security_alert@emc.com

Details

CVSS v2
10.0
NVD published
2011-09-19 12:02:55
Affected versions
cpe:2.3:a:cisco:unified_service_monitor:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_service_monitor:1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_service_monitor:2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_service_monitor:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_service_monitor:2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_service_monitor:2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_service_monitor:2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_service_monitor:8.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:december_2007:*:*:*:*:*:* cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:2.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_operations_manager:8.0:*:*:*:*:*:*:* cpe:2.3:a:emc:ionix_acm:*:*:*:*:*:*:*:* cpe:2.3:a:emc:ionix_asam:*:*:*:*:*:*:*:* cpe:2.3:a:emc:ionix_ip:*:*:*:*:*:*:*:*
Summary
Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used in Unified Operations Manager before 8.6 and CiscoWorks LAN Management Solution 3.x and 4.x before 4.1; and multiple EMC Ionix products including Application Connectivity Monitor (Ionix ACM) 2.3 and earlier, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) 3.2.0.2 and earlier, IP Management Suite (Ionix IP) 8.1.1.1 and earlier, and other Ionix products; allow remote attackers to execute arbitrary code via crafted packets to TCP port 9002, aka Bug IDs CSCtn42961 and CSCtn64922, related to a buffer overflow.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.