Submit a ticketCall us

AnnouncementsChange Is Inevitable

Get valuable help when it comes to tracking and monitoring changes. SolarWinds® Server Configuration Monitor (SCM) is designed to help you: detect, track, and receive alerts when changes occur, correlate system performance against configuration changes, compare server and application configuration against custom baselines, and verify application and system changes.

Learn more.

Home > Success Center > Network Configuration Manager (NCM) > NCM - Knowledgebase Articles > Vulnerability scanning on Cisco devices

Vulnerability scanning on Cisco devices

Table of contents

Updated February 9, 2017

Overview

Some Cisco devices are showing a potential vulnerability. This particular vulnerability does not affect their specific device type or model.

Environment

NCM version 7.5 and later

Detail

NCM searches vulnerabilities related only to Cisco IOS and Cisco ASA. 
NCM is looking for:
cpe:/o:cisco:ios:
cpe:/a:cisco:adaptive_security_appliance:
cpe:/o:cisco:adaptive_security_appliance:
cpe:/h:cisco:adaptive_security_appliance:
cpe:/a:cisco:adaptive_security_appliance_software:
cpe:/o:cisco:adaptive_security_appliance_software:
cpe:/h:cisco:adaptive_security_appliance_software:

 

Only announcements with similar CPE patterns will be taken into account.
CVE-2014-7998 announcement matches to common Cisco IOS cpe:/o:cisco:ios: pattern.

That is the reason you would get "potential” vulnerability for Cisco 2960 switch. 
NCM reports these “potential” vulnerabilities, and then the user should review and ignore the ones which are not applicable for a particular device.

 

 

 

Last modified

Tags

Classifications

Public