CVE-2007-2586

N/A Unknown
Published: May 10, 2007 Modified: April 23, 2026
View on NVD

Description

The FTP Server in Cisco IOS 11.3 through 12.4 does not properly check user authorization, which allows remote attackers to execute arbitrary code, and have other impact including reading startup-config, as demonstrated by a crafted MKD command that involves access to a VTY device and overflows a buffer, aka bug ID CSCek55259.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://seclists.org/bugtraq/2009/Jan/0183.html
Source: cve@mitre.org
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/25199
Source: cve@mitre.org
Not Applicable Third Party Advisory
http://www.exploit-db.com/exploits/6155
Source: cve@mitre.org
Exploit Third Party Advisory VDB Entry
http://www.osvdb.org/35334
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/archive/1/494868
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23885
Source: cve@mitre.org
Broken Link Exploit Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018030
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1749
Source: cve@mitre.org
Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/34197
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://seclists.org/bugtraq/2009/Jan/0183.html
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/25199
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable Third Party Advisory
http://www.cisco.com/en/US/products/products_security_advisory09186a00808399d0.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.exploit-db.com/exploits/6155
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://www.osvdb.org/35334
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/494868
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23885
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018030
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1749
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/34197
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5036
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
60.7%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

cisco