Submit a ticketCall us

WebinarWebinar: A checklist for planning your Network Performance Monitor (NPM) upgrade

Are you ready for your next upgrade? To help you plan smoothly, join this webcast to learn more about, SolarWinds® Orion® Installer, SolarWinds Upgrade Advisor, Upgrades Guides, Training Videos, and other resources available. We’ll share key upgrade planning considerations, lessons learned from customers with practical advice from SolarWinds Product Experts. We’ll also give practical tips to identify the estimated time needed and resources, how to prepare the business and IT staff for changes, ways to plan for required system changes, and more.

Register now.

Home > Success Center > Network Configuration Manager (NCM) > NCM - Knowledgebase Articles > Vulnerability scanning on Cisco devices

Vulnerability scanning on Cisco devices

Table of contents

Updated February 9, 2017

Overview

Some Cisco devices are showing a potential vulnerability. This particular vulnerability does not affect their specific device type or model.

Environment

NCM version 7.5 and later

Detail

NCM searches vulnerabilities related only to Cisco IOS and Cisco ASA. 
NCM is looking for:
cpe:/o:cisco:ios:
cpe:/a:cisco:adaptive_security_appliance:
cpe:/o:cisco:adaptive_security_appliance:
cpe:/h:cisco:adaptive_security_appliance:
cpe:/a:cisco:adaptive_security_appliance_software:
cpe:/o:cisco:adaptive_security_appliance_software:
cpe:/h:cisco:adaptive_security_appliance_software:

 

Only announcements with similar CPE patterns will be taken into account.
CVE-2014-7998 announcement matches to common Cisco IOS cpe:/o:cisco:ios: pattern.

That is the reason you would get "potential” vulnerability for Cisco 2960 switch. 
NCM reports these “potential” vulnerabilities, and then the user should review and ignore the ones which are not applicable for a particular device.

 

 

 

Last modified

Tags

Classifications

Public