CVE-2006-4430 (GCVE-0-2006-4430)

Vulnerability from cvelistv5 – Published: 2006-08-29 00:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.879Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
          },
          {
            "name": "19726",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19726"
          },
          {
            "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
          },
          {
            "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
          },
          {
            "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
          },
          {
            "name": "20060826 NAC Agent Installation Bypass",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
          },
          {
            "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
          },
          {
            "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
        },
        {
          "name": "19726",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19726"
        },
        {
          "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
        },
        {
          "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
        },
        {
          "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
        },
        {
          "name": "20060826 NAC Agent Installation Bypass",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
        },
        {
          "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
        },
        {
          "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4430",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050822 RE: Cisco Clean Access Agent (Perfigo) bypass",
              "refsource": "BUGTRAQ",
              "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
            },
            {
              "name": "19726",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19726"
            },
            {
              "name": "20060829 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
            },
            {
              "name": "20060822 Response to BugTraq - Cisco Clean Access Agent (Perfigo) Bypass",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
            },
            {
              "name": "20050819 Cisco Clean Access Agent (Perfigo) bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
            },
            {
              "name": "20060826 NAC Agent Installation Bypass",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
            },
            {
              "name": "20060826 Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
            },
            {
              "name": "20060826 Cisco NAC Appliance Agent Installation Bypass Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4430",
    "datePublished": "2006-08-29T00:00:00",
    "dateReserved": "2006-08-28T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.879Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.6.4.1\", \"matchCriteriaId\": \"8ABB4C62-1CF7-4280-B084-2C7EB3C7198C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D17AF7C3-3453-4343-AC57-B3BAACAD36E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D20F5D1-C28A-4D0E-B4BA-3F8A9B05933E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA3ABF2-F8D7-4D46-8862-072AD105AE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28B34BF7-B96E-4C6A-B6BD-803680629300\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"280C9607-98C6-44CE-9017-43592EC9D013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F972C202-DEEB-49AD-BBE7-442CA0E975E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"028ABC18-8944-474C-8482-2DC4F0E0B51B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD764CC4-F985-4A2F-B744-0B07BE59534F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B450984-DF81-46FE-A3E2-16323D1E55A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6133BA76-655F-4023-A5C5-31919D3C45E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A5D9FFC-728E-4E2A-9787-0748D0C88433\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8559F336-5A94-43ED-BF2E-0126038DA3C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7FE412A-DB93-41FC-85B3-38E46913BEB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63702A32-F7D3-46FF-B7B2-A845081D3AFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF86C8A2-154B-49B3-B263-41826DC196BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CC77562-5C30-4DA3-AFCD-7CD63D85E298\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9CD71A6-724B-42C1-BBBD-456F74393909\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5\\\\(9\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7EDB2AB-B6EA-4327-A969-88BB822B3896\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6828C91-18F9-4E36-B496-56E559180480\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2251B20D-F0AA-4FCA-8B62-B3EED16726E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D400E92-D0E4-43C2-8ECF-84352B5B2608\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A59115E7-A5AB-4468-BE51-AB6E8D188B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFE9D413-8078-4618-B4A6-4D774D30930F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D89BCC4B-14A8-459F-94D9-70DDB6C205F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55E40D45-E092-4D75-BE3C-64B7AB7A1018\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.\"}, {\"lang\": \"es\", \"value\": \"The Cisco Network Admission Control (NAC) 3.6.4.1 y anteriores permite a un atacante remoto prevenir la instalaci\\u00f3n de Cisco Clean Access (CCA) Agent y evitar los mecanismos de protecci\\u00f3n locales y remotos a trav\\u00e9s de la modficaci\\u00f3n de (1) la cabecera HTTP User-Agent o (2) el comportamiento de la pila TCP/IP. NOTA:el vendedor ha discutido la severidad de este asunto, indicando que los usuarios no pueden puentear los mecanismos de autentificaci\\u00f3n.\"}]",
      "id": "CVE-2006-4430",
      "lastModified": "2024-11-21T00:15:55.750",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2006-08-29T00:04:00.000",
      "references": "[{\"url\": \"http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/408603/30/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/444424/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/444501/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/444737/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/19726\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/408603/30/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/444424/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/444501/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/444737/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/19726\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-4430\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-08-29T00:04:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.\"},{\"lang\":\"es\",\"value\":\"The Cisco Network Admission Control (NAC) 3.6.4.1 y anteriores permite a un atacante remoto prevenir la instalaci\u00f3n de Cisco Clean Access (CCA) Agent y evitar los mecanismos de protecci\u00f3n locales y remotos a trav\u00e9s de la modficaci\u00f3n de (1) la cabecera HTTP User-Agent o (2) el comportamiento de la pila TCP/IP. NOTA:el vendedor ha discutido la severidad de este asunto, indicando que los usuarios no pueden puentear los mecanismos de autentificaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6.4.1\",\"matchCriteriaId\":\"8ABB4C62-1CF7-4280-B084-2C7EB3C7198C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D17AF7C3-3453-4343-AC57-B3BAACAD36E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D20F5D1-C28A-4D0E-B4BA-3F8A9B05933E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA3ABF2-F8D7-4D46-8862-072AD105AE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B34BF7-B96E-4C6A-B6BD-803680629300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280C9607-98C6-44CE-9017-43592EC9D013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F972C202-DEEB-49AD-BBE7-442CA0E975E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"028ABC18-8944-474C-8482-2DC4F0E0B51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD764CC4-F985-4A2F-B744-0B07BE59534F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B450984-DF81-46FE-A3E2-16323D1E55A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6133BA76-655F-4023-A5C5-31919D3C45E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5D9FFC-728E-4E2A-9787-0748D0C88433\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8559F336-5A94-43ED-BF2E-0126038DA3C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7FE412A-DB93-41FC-85B3-38E46913BEB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63702A32-F7D3-46FF-B7B2-A845081D3AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF86C8A2-154B-49B3-B263-41826DC196BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC77562-5C30-4DA3-AFCD-7CD63D85E298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9CD71A6-724B-42C1-BBBD-456F74393909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EDB2AB-B6EA-4327-A969-88BB822B3896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6828C91-18F9-4E36-B496-56E559180480\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2251B20D-F0AA-4FCA-8B62-B3EED16726E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D400E92-D0E4-43C2-8ECF-84352B5B2608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A59115E7-A5AB-4468-BE51-AB6E8D188B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE9D413-8078-4618-B4A6-4D774D30930F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D89BCC4B-14A8-459F-94D9-70DDB6C205F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55E40D45-E092-4D75-BE3C-64B7AB7A1018\"}]}]}],\"references\":[{\"url\":\"http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/408603/30/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/444424/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/444501/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/444737/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19726\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/408603/30/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/444424/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/444501/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/444737/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19726\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…