Submit a ticketCall us

Putting Your Logs Where They Belong with the New SolarWinds Log Manager for Orion

The new SolarWinds® Log Manager for Orion® finally puts your log data right where it belongs, in the heart of your Orion console. Gain insight into the performance of your infrastructure by monitoring your logs in a unified console allowing you to see a wealth of information about the health and performance of your network and servers.

Reserve a Seat for Wednesday May 23rd 11am CDT | Reserve a Seat for Tuesday May 22nd 10:30am GMT | Reserve a Seat for Tuesday May 22nd 1pm SGT / 3pm AEST

Home > Success Center > Network Configuration Manager (NCM) > Vulnerability scanning on Cisco devices

Vulnerability scanning on Cisco devices

Table of contents

Updated February 9, 2017

Overview

Some Cisco devices are showing a potential vulnerability. This particular vulnerability does not affect their specific device type or model.

Environment

NCM version 7.5 and later

Detail

NCM searches vulnerabilities related only to Cisco IOS and Cisco ASA. 
NCM is looking for:
cpe:/o:cisco:ios:
cpe:/a:cisco:adaptive_security_appliance:
cpe:/o:cisco:adaptive_security_appliance:
cpe:/h:cisco:adaptive_security_appliance:
cpe:/a:cisco:adaptive_security_appliance_software:
cpe:/o:cisco:adaptive_security_appliance_software:
cpe:/h:cisco:adaptive_security_appliance_software:

 

Only announcements with similar CPE patterns will be taken into account.
CVE-2014-7998 announcement matches to common Cisco IOS cpe:/o:cisco:ios: pattern.

That is the reason you would get "potential” vulnerability for Cisco 2960 switch. 
NCM reports these “potential” vulnerabilities, and then the user should review and ignore the ones which are not applicable for a particular device.

 

 

 

Last modified

Tags

Classifications

Public