Search criteria

21 vulnerabilities found for network_admission_control_manager_and_server_system_software by cisco

FKIE_CVE-2013-1177

Vulnerability from fkie_nvd - Published: 2013-04-18 18:55 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B71D2DEF-D07C-4B35-B296-6E9330B4D2CC",
              "versionEndIncluding": "4.8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5799E92B-6742-4AC2-ACF9-39398671EDE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C408C8-0415-4AAD-BBC8-EDD7A8AAD6F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5860E05-8DA2-48CE-85EE-1A8FA19545D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E78679FF-8AFB-4119-A2E0-2AB8FCBB3A92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB3F516-D190-4987-ABAF-D2D4229AF03E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en Network Admission Control Manager Cisco (NAC) antes de v4.8.3.1 y v4.9.x antes de v4.9.2 permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como Bug ID CSCub23095."
    }
  ],
  "id": "CVE-2013-1177",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-04-18T18:55:06.910",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-0057

Vulnerability from fkie_nvd - Published: 2007-01-04 22:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E5B3FE1-9F94-45EC-A9BF-D158F2644BE5",
              "versionEndIncluding": "3.6.4.2",
              "versionStartIncluding": "3.6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EB104B-B31D-449C-AE7D-D64DD7F5C0A4",
              "versionEndExcluding": "4.0.3.2",
              "versionStartIncluding": "4.0.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access."
    },
    {
      "lang": "es",
      "value": "Cisco Clean Access (CCA) 3.6.x hasta 3.6.4.2 y 4.0.x hasta 4.0.3.2 no configura apropiadamente o permite la modificaci\u00f3n de una clave secreta de autenticaci\u00f3n compartida, lo que provoca que todos los dispositivos tengan la misma compartici\u00f3n secreta y permite a atacantes remotos conseguir acceso no autorizado."
    }
  ],
  "id": "CVE-2007-0057",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-01-04T22:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/32578"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/23617"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017465"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/32578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/23617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0030"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-0058

Vulnerability from fkie_nvd - Published: 2007-01-04 22:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7A6B855-C210-4478-B97B-EFD2C05BD168",
              "versionEndIncluding": "3.5.9",
              "versionStartIncluding": "3.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5FD7EA-9D1F-417C-854A-D0D7650C1BC4",
              "versionEndIncluding": "3.6.1.1",
              "versionStartIncluding": "3.6.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file."
    },
    {
      "lang": "es",
      "value": "Cisco Clean Access (CCA) 3.5.x hasta 3.5.9  y 3.6.x hasta 3.6.1.1 en el Clean Access Manager (CAM) permite a atacantes remotos evitar autenticaci\u00f3n y descargar bases de datos de respaldo manuales de su elecci\u00f3n averiguando el nombre del fichero de captura usando fuerza bruta, y posteriormente realizando una petici\u00f3n directa del fichero."
    }
  ],
  "id": "CVE-2007-0058",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-01-04T22:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/23556"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017465"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/32579"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/23556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/32579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0030"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-4430

Vulnerability from fkie_nvd - Published: 2006-08-29 00:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.
Impacted products
Vendor Product Version
cisco network_admission_control *
cisco network_admission_control_manager_and_server_system_software 3.3
cisco network_admission_control_manager_and_server_system_software 3.3.1
cisco network_admission_control_manager_and_server_system_software 3.3.2
cisco network_admission_control_manager_and_server_system_software 3.3.3
cisco network_admission_control_manager_and_server_system_software 3.3.4
cisco network_admission_control_manager_and_server_system_software 3.3.5
cisco network_admission_control_manager_and_server_system_software 3.3.6
cisco network_admission_control_manager_and_server_system_software 3.3.7
cisco network_admission_control_manager_and_server_system_software 3.3.8
cisco network_admission_control_manager_and_server_system_software 3.3.9
cisco network_admission_control_manager_and_server_system_software 3.4
cisco network_admission_control_manager_and_server_system_software 3.4.1
cisco network_admission_control_manager_and_server_system_software 3.4.2
cisco network_admission_control_manager_and_server_system_software 3.4.3
cisco network_admission_control_manager_and_server_system_software 3.4.4
cisco network_admission_control_manager_and_server_system_software 3.4.5
cisco network_admission_control_manager_and_server_system_software 3.5
cisco network_admission_control_manager_and_server_system_software 3.5\(9\)
cisco network_admission_control_manager_and_server_system_software 3.5.1
cisco network_admission_control_manager_and_server_system_software 3.5.2
cisco network_admission_control_manager_and_server_system_software 3.5.3
cisco network_admission_control_manager_and_server_system_software 3.5.4
cisco network_admission_control_manager_and_server_system_software 3.5.5
cisco network_admission_control_manager_and_server_system_software 3.6.0.1
cisco network_admission_control_manager_and_server_system_software 3.6.4.0.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ABB4C62-1CF7-4280-B084-2C7EB3C7198C",
              "versionEndIncluding": "3.6.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17AF7C3-3453-4343-AC57-B3BAACAD36E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D20F5D1-C28A-4D0E-B4BA-3F8A9B05933E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA3ABF2-F8D7-4D46-8862-072AD105AE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B34BF7-B96E-4C6A-B6BD-803680629300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "280C9607-98C6-44CE-9017-43592EC9D013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F972C202-DEEB-49AD-BBE7-442CA0E975E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "028ABC18-8944-474C-8482-2DC4F0E0B51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD764CC4-F985-4A2F-B744-0B07BE59534F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B450984-DF81-46FE-A3E2-16323D1E55A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6133BA76-655F-4023-A5C5-31919D3C45E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5D9FFC-728E-4E2A-9787-0748D0C88433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8559F336-5A94-43ED-BF2E-0126038DA3C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7FE412A-DB93-41FC-85B3-38E46913BEB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "63702A32-F7D3-46FF-B7B2-A845081D3AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF86C8A2-154B-49B3-B263-41826DC196BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC77562-5C30-4DA3-AFCD-7CD63D85E298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CD71A6-724B-42C1-BBBD-456F74393909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7EDB2AB-B6EA-4327-A969-88BB822B3896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6828C91-18F9-4E36-B496-56E559180480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2251B20D-F0AA-4FCA-8B62-B3EED16726E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D400E92-D0E4-43C2-8ECF-84352B5B2608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A59115E7-A5AB-4468-BE51-AB6E8D188B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE9D413-8078-4618-B4A6-4D774D30930F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D89BCC4B-14A8-459F-94D9-70DDB6C205F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55E40D45-E092-4D75-BE3C-64B7AB7A1018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
    },
    {
      "lang": "es",
      "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 y anteriores permite a un atacante remoto prevenir la instalaci\u00f3n de Cisco Clean Access (CCA) Agent y evitar los mecanismos de protecci\u00f3n locales y remotos a trav\u00e9s de la modficaci\u00f3n de (1) la cabecera HTTP User-Agent o (2) el comportamiento de la pila TCP/IP. NOTA:el vendedor ha discutido la severidad de este asunto, indicando que los usuarios no pueden puentear los mecanismos de autentificaci\u00f3n."
    }
  ],
  "id": "CVE-2006-4430",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-29T00:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19726"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4825

Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CD71A6-724B-42C1-BBBD-456F74393909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7EDB2AB-B6EA-4327-A969-88BB822B3896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6828C91-18F9-4E36-B496-56E559180480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2251B20D-F0AA-4FCA-8B62-B3EED16726E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D400E92-D0E4-43C2-8ECF-84352B5B2608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A59115E7-A5AB-4468-BE51-AB6E8D188B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE9D413-8078-4618-B4A6-4D774D30930F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service (disk consumption), or make unauthorized files accessible, by uploading files through requests to certain JSP scripts, a related issue to CVE-2005-4332."
    }
  ],
  "id": "CVE-2005-4825",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 5.7,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.osvdb.org/21959"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.osvdb.org/21959"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4332

Vulnerability from fkie_nvd - Published: 2005-12-17 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp.
References
cve@mitre.orghttp://secunia.com/advisories/18103
cve@mitre.orghttp://securityreason.com/securityalert/265
cve@mitre.orghttp://securitytracker.com/id?1015375
cve@mitre.orghttp://www.awarenetwork.org/forum/viewtopic.php?p=2236Vendor Advisory
cve@mitre.orghttp://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml
cve@mitre.orghttp://www.osvdb.org/21956
cve@mitre.orghttp://www.osvdb.org/21957
cve@mitre.orghttp://www.osvdb.org/21958
cve@mitre.orghttp://www.securityfocus.com/archive/1/419645/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/420008/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/15909
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/3007
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18103
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/265
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015375
af854a3a-2127-422b-91ae-364da2661108http://www.awarenetwork.org/forum/viewtopic.php?p=2236Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/21956
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/21957
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/21958
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/419645/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/420008/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15909
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/3007
Impacted products
Vendor Product Version
cisco network_admission_control_manager_and_server_system_software 3.3
cisco network_admission_control_manager_and_server_system_software 3.3.1
cisco network_admission_control_manager_and_server_system_software 3.3.2
cisco network_admission_control_manager_and_server_system_software 3.3.3
cisco network_admission_control_manager_and_server_system_software 3.3.4
cisco network_admission_control_manager_and_server_system_software 3.3.5
cisco network_admission_control_manager_and_server_system_software 3.3.6
cisco network_admission_control_manager_and_server_system_software 3.3.7
cisco network_admission_control_manager_and_server_system_software 3.3.8
cisco network_admission_control_manager_and_server_system_software 3.3.9
cisco network_admission_control_manager_and_server_system_software 3.4
cisco network_admission_control_manager_and_server_system_software 3.4.1
cisco network_admission_control_manager_and_server_system_software 3.4.2
cisco network_admission_control_manager_and_server_system_software 3.4.3
cisco network_admission_control_manager_and_server_system_software 3.4.4
cisco network_admission_control_manager_and_server_system_software 3.4.5
cisco network_admission_control_manager_and_server_system_software 3.5
cisco network_admission_control_manager_and_server_system_software 3.5.1
cisco network_admission_control_manager_and_server_system_software 3.5.2
cisco network_admission_control_manager_and_server_system_software 3.5.3
cisco network_admission_control_manager_and_server_system_software 3.5.4
cisco network_admission_control_manager_and_server_system_software 3.5.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17AF7C3-3453-4343-AC57-B3BAACAD36E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D20F5D1-C28A-4D0E-B4BA-3F8A9B05933E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA3ABF2-F8D7-4D46-8862-072AD105AE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B34BF7-B96E-4C6A-B6BD-803680629300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "280C9607-98C6-44CE-9017-43592EC9D013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F972C202-DEEB-49AD-BBE7-442CA0E975E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "028ABC18-8944-474C-8482-2DC4F0E0B51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD764CC4-F985-4A2F-B744-0B07BE59534F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B450984-DF81-46FE-A3E2-16323D1E55A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6133BA76-655F-4023-A5C5-31919D3C45E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5D9FFC-728E-4E2A-9787-0748D0C88433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8559F336-5A94-43ED-BF2E-0126038DA3C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7FE412A-DB93-41FC-85B3-38E46913BEB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "63702A32-F7D3-46FF-B7B2-A845081D3AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF86C8A2-154B-49B3-B263-41826DC196BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC77562-5C30-4DA3-AFCD-7CD63D85E298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CD71A6-724B-42C1-BBBD-456F74393909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6828C91-18F9-4E36-B496-56E559180480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2251B20D-F0AA-4FCA-8B62-B3EED16726E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D400E92-D0E4-43C2-8ECF-84352B5B2608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A59115E7-A5AB-4468-BE51-AB6E8D188B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE9D413-8078-4618-B4A6-4D774D30930F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp."
    }
  ],
  "id": "CVE-2005-4332",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-17T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18103"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/265"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015375"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/21956"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/21957"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/21958"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15909"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/3007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/265"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015375"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/21956"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/21957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/21958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/3007"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2631

Vulnerability from fkie_nvd - Published: 2005-08-23 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17AF7C3-3453-4343-AC57-B3BAACAD36E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D20F5D1-C28A-4D0E-B4BA-3F8A9B05933E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA3ABF2-F8D7-4D46-8862-072AD105AE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B34BF7-B96E-4C6A-B6BD-803680629300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "280C9607-98C6-44CE-9017-43592EC9D013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F972C202-DEEB-49AD-BBE7-442CA0E975E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "028ABC18-8944-474C-8482-2DC4F0E0B51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD764CC4-F985-4A2F-B744-0B07BE59534F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B450984-DF81-46FE-A3E2-16323D1E55A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6133BA76-655F-4023-A5C5-31919D3C45E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5D9FFC-728E-4E2A-9787-0748D0C88433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8559F336-5A94-43ED-BF2E-0126038DA3C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7FE412A-DB93-41FC-85B3-38E46913BEB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "63702A32-F7D3-46FF-B7B2-A845081D3AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF86C8A2-154B-49B3-B263-41826DC196BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC77562-5C30-4DA3-AFCD-7CD63D85E298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CD71A6-724B-42C1-BBBD-456F74393909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6828C91-18F9-4E36-B496-56E559180480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2251B20D-F0AA-4FCA-8B62-B3EED16726E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D400E92-D0E4-43C2-8ECF-84352B5B2608",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users."
    }
  ],
  "id": "CVE-2005-2631",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-23T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16472/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14585"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16472/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/14585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2013-1177 (GCVE-0-2013-1177)

Vulnerability from cvelistv5 – Published: 2013-04-18 18:00 – Updated: 2024-09-17 00:16
VLAI?
Summary
SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.713Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130417 Cisco Network Admission Control Manager SQL Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-18T18:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130417 Cisco Network Admission Control Manager SQL Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1177",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130417 Cisco Network Admission Control Manager SQL Injection Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1177",
    "datePublished": "2013-04-18T18:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-17T00:16:45.448Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4825 (GCVE-0-2005-4825)

Vulnerability from cvelistv5 – Published: 2007-01-29 16:00 – Updated: 2024-09-16 23:55
VLAI?
Summary
Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service (disk consumption), or make unauthorized files accessible, by uploading files through requests to certain JSP scripts, a related issue to CVE-2005-4332.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/419645/30/… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/21959 vdb-entryx_refsource_OSVDB
http://www.cisco.com/warp/public/707/cisco-respon… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:01:23.350Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20051216 DoS in Cisco Clean Access",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
          },
          {
            "name": "21959",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21959"
          },
          {
            "name": "20051221 Response to DoS in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service (disk consumption), or make unauthorized files accessible, by uploading files through requests to certain JSP scripts, a related issue to CVE-2005-4332."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-01-29T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20051216 DoS in Cisco Clean Access",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
        },
        {
          "name": "21959",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21959"
        },
        {
          "name": "20051221 Response to DoS in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4825",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service (disk consumption), or make unauthorized files accessible, by uploading files through requests to certain JSP scripts, a related issue to CVE-2005-4332."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20051216 DoS in Cisco Clean Access",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
            },
            {
              "name": "21959",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21959"
            },
            {
              "name": "20051221 Response to DoS in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4825",
    "datePublished": "2007-01-29T16:00:00Z",
    "dateReserved": "2007-01-29T00:00:00Z",
    "dateUpdated": "2024-09-16T23:55:52.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-0058 (GCVE-0-2007-0058)

Vulnerability from cvelistv5 – Published: 2007-01-04 22:00 – Updated: 2024-08-07 12:03
VLAI?
Summary
Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/23556 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/32579 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2007/0030 vdb-entryx_refsource_VUPEN
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://securitytracker.com/id?1017465 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.996Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23556",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23556"
          },
          {
            "name": "32579",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/32579"
          },
          {
            "name": "ADV-2007-0030",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0030"
          },
          {
            "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
          },
          {
            "name": "1017465",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017465"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-15T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23556",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23556"
        },
        {
          "name": "32579",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/32579"
        },
        {
          "name": "ADV-2007-0030",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0030"
        },
        {
          "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
        },
        {
          "name": "1017465",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017465"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0058",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23556",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23556"
            },
            {
              "name": "32579",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/32579"
            },
            {
              "name": "ADV-2007-0030",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0030"
            },
            {
              "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
            },
            {
              "name": "1017465",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017465"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0058",
    "datePublished": "2007-01-04T22:00:00",
    "dateReserved": "2007-01-04T00:00:00",
    "dateUpdated": "2024-08-07T12:03:36.996Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-0057 (GCVE-0-2007-0057)

Vulnerability from cvelistv5 – Published: 2007-01-04 22:00 – Updated: 2024-08-07 12:03
VLAI?
Summary
Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/23617 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/0030 vdb-entryx_refsource_VUPEN
http://osvdb.org/32578 vdb-entryx_refsource_OSVDB
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://securitytracker.com/id?1017465 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.972Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23617",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23617"
          },
          {
            "name": "ADV-2007-0030",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0030"
          },
          {
            "name": "32578",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32578"
          },
          {
            "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
          },
          {
            "name": "1017465",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017465"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23617",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23617"
        },
        {
          "name": "ADV-2007-0030",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0030"
        },
        {
          "name": "32578",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32578"
        },
        {
          "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
        },
        {
          "name": "1017465",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017465"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0057",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23617",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23617"
            },
            {
              "name": "ADV-2007-0030",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0030"
            },
            {
              "name": "32578",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/32578"
            },
            {
              "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
            },
            {
              "name": "1017465",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017465"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0057",
    "datePublished": "2007-01-04T22:00:00",
    "dateReserved": "2007-01-04T00:00:00",
    "dateUpdated": "2024-08-07T12:03:36.972Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4430 (GCVE-0-2006-4430)

Vulnerability from cvelistv5 – Published: 2006-08-29 00:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.879Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
          },
          {
            "name": "19726",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19726"
          },
          {
            "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
          },
          {
            "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
          },
          {
            "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
          },
          {
            "name": "20060826 NAC Agent Installation Bypass",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
          },
          {
            "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
          },
          {
            "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
        },
        {
          "name": "19726",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19726"
        },
        {
          "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
        },
        {
          "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
        },
        {
          "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
        },
        {
          "name": "20060826 NAC Agent Installation Bypass",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
        },
        {
          "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
        },
        {
          "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4430",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
              "refsource": "BUGTRAQ",
              "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
            },
            {
              "name": "19726",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19726"
            },
            {
              "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
            },
            {
              "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
            },
            {
              "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
            },
            {
              "name": "20060826 NAC Agent Installation Bypass",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
            },
            {
              "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
            },
            {
              "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4430",
    "datePublished": "2006-08-29T00:00:00",
    "dateReserved": "2006-08-28T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.879Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4332 (GCVE-0-2005-4332)

Vulnerability from cvelistv5 – Published: 2005-12-17 11:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2005/3007 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/419645/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/21957 vdb-entryx_refsource_OSVDB
http://www.awarenetwork.org/forum/viewtopic.php?p=2236 x_refsource_MISC
http://www.cisco.com/warp/public/707/cisco-respon… vendor-advisoryx_refsource_CISCO
http://www.osvdb.org/21958 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/420008/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/15909 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/265 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/18103 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/21956 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1015375 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:52.063Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2005-3007",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/3007"
          },
          {
            "name": "20051216 DoS in Cisco Clean Access",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
          },
          {
            "name": "21957",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21957"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
          },
          {
            "name": "20051221 Response to DoS in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
          },
          {
            "name": "21958",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21958"
          },
          {
            "name": "20051221 Cisco Security Response: DoS in Cisco Clean Access",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
          },
          {
            "name": "15909",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15909"
          },
          {
            "name": "265",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/265"
          },
          {
            "name": "18103",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18103"
          },
          {
            "name": "21956",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21956"
          },
          {
            "name": "1015375",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015375"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2005-3007",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/3007"
        },
        {
          "name": "20051216 DoS in Cisco Clean Access",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
        },
        {
          "name": "21957",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21957"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
        },
        {
          "name": "20051221 Response to DoS in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
        },
        {
          "name": "21958",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21958"
        },
        {
          "name": "20051221 Cisco Security Response: DoS in Cisco Clean Access",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
        },
        {
          "name": "15909",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15909"
        },
        {
          "name": "265",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/265"
        },
        {
          "name": "18103",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18103"
        },
        {
          "name": "21956",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21956"
        },
        {
          "name": "1015375",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015375"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2005-3007",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/3007"
            },
            {
              "name": "20051216 DoS in Cisco Clean Access",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
            },
            {
              "name": "21957",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21957"
            },
            {
              "name": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236",
              "refsource": "MISC",
              "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
            },
            {
              "name": "20051221 Response to DoS in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
            },
            {
              "name": "21958",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21958"
            },
            {
              "name": "20051221 Cisco Security Response: DoS in Cisco Clean Access",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
            },
            {
              "name": "15909",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15909"
            },
            {
              "name": "265",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/265"
            },
            {
              "name": "18103",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18103"
            },
            {
              "name": "21956",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21956"
            },
            {
              "name": "1015375",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015375"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4332",
    "datePublished": "2005-12-17T11:00:00",
    "dateReserved": "2005-12-17T00:00:00",
    "dateUpdated": "2024-08-07T23:38:52.063Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2631 (GCVE-0-2005-2631)

Vulnerability from cvelistv5 – Published: 2005-08-20 04:00 – Updated: 2024-08-07 22:30
VLAI?
Summary
Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/16472/ third-party-advisoryx_refsource_SECUNIA
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/14585 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "16472",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16472/"
          },
          {
            "name": "20050817 Cisco Security Advisory: Cisco Clean Access Unauthenticated API Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
          },
          {
            "name": "14585",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14585"
          },
          {
            "name": "cisco-cca-security-bypass(21884)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "16472",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16472/"
        },
        {
          "name": "20050817 Cisco Security Advisory: Cisco Clean Access Unauthenticated API Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
        },
        {
          "name": "14585",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14585"
        },
        {
          "name": "cisco-cca-security-bypass(21884)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2631",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "16472",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16472/"
            },
            {
              "name": "20050817 Cisco Security Advisory: Cisco Clean Access Unauthenticated API Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
            },
            {
              "name": "14585",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14585"
            },
            {
              "name": "cisco-cca-security-bypass(21884)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2631",
    "datePublished": "2005-08-20T04:00:00",
    "dateReserved": "2005-08-20T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.808Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1177 (GCVE-0-2013-1177)

Vulnerability from nvd – Published: 2013-04-18 18:00 – Updated: 2024-09-17 00:16
VLAI?
Summary
SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://tools.cisco.com/security/center/content/Ci… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.713Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130417 Cisco Network Admission Control Manager SQL Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-18T18:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130417 Cisco Network Admission Control Manager SQL Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1177",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in Cisco Network Admission Control (NAC) Manager before 4.8.3.1 and 4.9.x before 4.9.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCub23095."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130417 Cisco Network Admission Control Manager SQL Injection Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1177",
    "datePublished": "2013-04-18T18:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-17T00:16:45.448Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4825 (GCVE-0-2005-4825)

Vulnerability from nvd – Published: 2007-01-29 16:00 – Updated: 2024-09-16 23:55
VLAI?
Summary
Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service (disk consumption), or make unauthorized files accessible, by uploading files through requests to certain JSP scripts, a related issue to CVE-2005-4332.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/419645/30/… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/21959 vdb-entryx_refsource_OSVDB
http://www.cisco.com/warp/public/707/cisco-respon… vendor-advisoryx_refsource_CISCO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:01:23.350Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20051216 DoS in Cisco Clean Access",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
          },
          {
            "name": "21959",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21959"
          },
          {
            "name": "20051221 Response to DoS in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service (disk consumption), or make unauthorized files accessible, by uploading files through requests to certain JSP scripts, a related issue to CVE-2005-4332."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-01-29T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20051216 DoS in Cisco Clean Access",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
        },
        {
          "name": "21959",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21959"
        },
        {
          "name": "20051221 Response to DoS in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4825",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service (disk consumption), or make unauthorized files accessible, by uploading files through requests to certain JSP scripts, a related issue to CVE-2005-4332."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20051216 DoS in Cisco Clean Access",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/419645/30/0/threaded"
            },
            {
              "name": "21959",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21959"
            },
            {
              "name": "20051221 Response to DoS in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4825",
    "datePublished": "2007-01-29T16:00:00Z",
    "dateReserved": "2007-01-29T00:00:00Z",
    "dateUpdated": "2024-09-16T23:55:52.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-0058 (GCVE-0-2007-0058)

Vulnerability from nvd – Published: 2007-01-04 22:00 – Updated: 2024-08-07 12:03
VLAI?
Summary
Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/23556 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/32579 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2007/0030 vdb-entryx_refsource_VUPEN
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://securitytracker.com/id?1017465 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.996Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23556",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23556"
          },
          {
            "name": "32579",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/32579"
          },
          {
            "name": "ADV-2007-0030",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0030"
          },
          {
            "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
          },
          {
            "name": "1017465",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017465"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-15T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23556",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23556"
        },
        {
          "name": "32579",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/32579"
        },
        {
          "name": "ADV-2007-0030",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0030"
        },
        {
          "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
        },
        {
          "name": "1017465",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017465"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0058",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23556",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23556"
            },
            {
              "name": "32579",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/32579"
            },
            {
              "name": "ADV-2007-0030",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0030"
            },
            {
              "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
            },
            {
              "name": "1017465",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017465"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0058",
    "datePublished": "2007-01-04T22:00:00",
    "dateReserved": "2007-01-04T00:00:00",
    "dateUpdated": "2024-08-07T12:03:36.996Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-0057 (GCVE-0-2007-0057)

Vulnerability from nvd – Published: 2007-01-04 22:00 – Updated: 2024-08-07 12:03
VLAI?
Summary
Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/23617 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/0030 vdb-entryx_refsource_VUPEN
http://osvdb.org/32578 vdb-entryx_refsource_OSVDB
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://securitytracker.com/id?1017465 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.972Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23617",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23617"
          },
          {
            "name": "ADV-2007-0030",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0030"
          },
          {
            "name": "32578",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32578"
          },
          {
            "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
          },
          {
            "name": "1017465",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017465"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23617",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23617"
        },
        {
          "name": "ADV-2007-0030",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0030"
        },
        {
          "name": "32578",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32578"
        },
        {
          "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
        },
        {
          "name": "1017465",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017465"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0057",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23617",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23617"
            },
            {
              "name": "ADV-2007-0030",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0030"
            },
            {
              "name": "32578",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/32578"
            },
            {
              "name": "20070103 Multiple Vulnerabilities in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml"
            },
            {
              "name": "1017465",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017465"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0057",
    "datePublished": "2007-01-04T22:00:00",
    "dateReserved": "2007-01-04T00:00:00",
    "dateUpdated": "2024-08-07T12:03:36.972Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4430 (GCVE-0-2006-4430)

Vulnerability from nvd – Published: 2006-08-29 00:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.879Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
          },
          {
            "name": "19726",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19726"
          },
          {
            "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
          },
          {
            "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
          },
          {
            "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
          },
          {
            "name": "20060826 NAC Agent Installation Bypass",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
          },
          {
            "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
          },
          {
            "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
        },
        {
          "name": "19726",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19726"
        },
        {
          "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
        },
        {
          "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
        },
        {
          "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
        },
        {
          "name": "20060826 NAC Agent Installation Bypass",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
        },
        {
          "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
        },
        {
          "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4430",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
              "refsource": "BUGTRAQ",
              "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
            },
            {
              "name": "19726",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19726"
            },
            {
              "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
            },
            {
              "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
            },
            {
              "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
            },
            {
              "name": "20060826 NAC Agent Installation Bypass",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
            },
            {
              "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
            },
            {
              "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4430",
    "datePublished": "2006-08-29T00:00:00",
    "dateReserved": "2006-08-28T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.879Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4332 (GCVE-0-2005-4332)

Vulnerability from nvd – Published: 2005-12-17 11:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2005/3007 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/419645/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/21957 vdb-entryx_refsource_OSVDB
http://www.awarenetwork.org/forum/viewtopic.php?p=2236 x_refsource_MISC
http://www.cisco.com/warp/public/707/cisco-respon… vendor-advisoryx_refsource_CISCO
http://www.osvdb.org/21958 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/420008/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/15909 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/265 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/18103 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/21956 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1015375 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:52.063Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2005-3007",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/3007"
          },
          {
            "name": "20051216 DoS in Cisco Clean Access",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
          },
          {
            "name": "21957",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21957"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
          },
          {
            "name": "20051221 Response to DoS in Cisco Clean Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
          },
          {
            "name": "21958",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21958"
          },
          {
            "name": "20051221 Cisco Security Response: DoS in Cisco Clean Access",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
          },
          {
            "name": "15909",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15909"
          },
          {
            "name": "265",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/265"
          },
          {
            "name": "18103",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18103"
          },
          {
            "name": "21956",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21956"
          },
          {
            "name": "1015375",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015375"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2005-3007",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/3007"
        },
        {
          "name": "20051216 DoS in Cisco Clean Access",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
        },
        {
          "name": "21957",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21957"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
        },
        {
          "name": "20051221 Response to DoS in Cisco Clean Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
        },
        {
          "name": "21958",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21958"
        },
        {
          "name": "20051221 Cisco Security Response: DoS in Cisco Clean Access",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
        },
        {
          "name": "15909",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15909"
        },
        {
          "name": "265",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/265"
        },
        {
          "name": "18103",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18103"
        },
        {
          "name": "21956",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21956"
        },
        {
          "name": "1015375",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015375"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2005-3007",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/3007"
            },
            {
              "name": "20051216 DoS in Cisco Clean Access",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/419645/100/0/threaded"
            },
            {
              "name": "21957",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21957"
            },
            {
              "name": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236",
              "refsource": "MISC",
              "url": "http://www.awarenetwork.org/forum/viewtopic.php?p=2236"
            },
            {
              "name": "20051221 Response to DoS in Cisco Clean Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-response-20051221-CCA.shtml"
            },
            {
              "name": "21958",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21958"
            },
            {
              "name": "20051221 Cisco Security Response: DoS in Cisco Clean Access",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420008/100/0/threaded"
            },
            {
              "name": "15909",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15909"
            },
            {
              "name": "265",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/265"
            },
            {
              "name": "18103",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18103"
            },
            {
              "name": "21956",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21956"
            },
            {
              "name": "1015375",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015375"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4332",
    "datePublished": "2005-12-17T11:00:00",
    "dateReserved": "2005-12-17T00:00:00",
    "dateUpdated": "2024-08-07T23:38:52.063Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2631 (GCVE-0-2005-2631)

Vulnerability from nvd – Published: 2005-08-20 04:00 – Updated: 2024-08-07 22:30
VLAI?
Summary
Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/16472/ third-party-advisoryx_refsource_SECUNIA
http://www.cisco.com/warp/public/707/cisco-sa-200… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/14585 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "16472",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16472/"
          },
          {
            "name": "20050817 Cisco Security Advisory: Cisco Clean Access Unauthenticated API Access",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
          },
          {
            "name": "14585",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14585"
          },
          {
            "name": "cisco-cca-security-bypass(21884)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "16472",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16472/"
        },
        {
          "name": "20050817 Cisco Security Advisory: Cisco Clean Access Unauthenticated API Access",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
        },
        {
          "name": "14585",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14585"
        },
        {
          "name": "cisco-cca-security-bypass(21884)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2631",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "16472",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16472/"
            },
            {
              "name": "20050817 Cisco Security Advisory: Cisco Clean Access Unauthenticated API Access",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
            },
            {
              "name": "14585",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14585"
            },
            {
              "name": "cisco-cca-security-bypass(21884)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2631",
    "datePublished": "2005-08-20T04:00:00",
    "dateReserved": "2005-08-20T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.808Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}