27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 6207 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show mac-address-table' Command<br />

<strong>PVS</strong> ID: 6208 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show running-config' Command<br />

<strong>PVS</strong> ID: 6209 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Successful Shell Attack Detected - Cisco 'show ip interface' Command<br />

<strong>PVS</strong> ID: 6210 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

Family Internet Services 1695

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!