VAR-200508-0080
Vulnerability from variot - Updated: 2023-12-18 13:54Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users. Cisco Clean Access (CCA) is a software solution that automatically detects, quarantines, and cleans infected or vulnerable devices attempting to access the network.
The vulnerability is caused due to missing authentication when invoking CCA Manager API methods. or gain knowledge of information on configured users.
The vulnerability affects versions 3.3.0 through 3.3.9, 3.4.0 through 3.4.5, and 3.5.0 through 3.5.3.
SOLUTION: Update to version 3.5.4 or later or apply patch. http://www.cisco.com/pcgi-bin/tablebuild.pl/cca-patches
Versions 3.3.0 and prior are not affected.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Troy Holder.
ORIGINAL ADVISORY: Cisco Systems: http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200508-0080",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.1"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.5"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.1"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.5"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.2"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.3"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.2"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.8"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.2"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.4"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.3"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.3"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.7"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.4"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.6"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.1"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4"
},
{
"model": "network admission control manager and server system software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.9"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.3"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.2"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.4.5"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.4.4"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.4.3"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.4.2"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.4.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.4"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.9"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.8"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.7"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.6"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.5"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.4"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.3"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.2"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3.1"
},
{
"model": "clean access",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.3"
},
{
"model": "clean access",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "3.5.4"
}
],
"sources": [
{
"db": "BID",
"id": "14585"
},
{
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2005-2631"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Troy Holder",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
],
"trust": 0.6
},
"cve": "CVE-2005-2631",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-13840",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2005-2631",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2005-2631",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200508-270",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-13840",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2005-2631",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-13840"
},
{
"db": "VULMON",
"id": "CVE-2005-2631"
},
{
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users. Cisco Clean Access (CCA) is a software solution that automatically detects, quarantines, and cleans infected or vulnerable devices attempting to access the network. \n\nThe vulnerability is caused due to missing authentication when\ninvoking CCA Manager API methods. or gain knowledge of information on\nconfigured users. \n\nThe vulnerability affects versions 3.3.0 through 3.3.9, 3.4.0 through\n3.4.5, and 3.5.0 through 3.5.3. \n\nSOLUTION:\nUpdate to version 3.5.4 or later or apply patch. \nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/cca-patches\n\nVersions 3.3.0 and prior are not affected. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Troy Holder. \n\nORIGINAL ADVISORY:\nCisco Systems:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"db": "BID",
"id": "14585"
},
{
"db": "VULHUB",
"id": "VHN-13840"
},
{
"db": "VULMON",
"id": "CVE-2005-2631"
},
{
"db": "PACKETSTORM",
"id": "39472"
}
],
"trust": 1.44
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "14585",
"trust": 2.1
},
{
"db": "SECUNIA",
"id": "16472",
"trust": 1.9
},
{
"db": "NVD",
"id": "CVE-2005-2631",
"trust": 1.8
},
{
"db": "CNNVD",
"id": "CNNVD-200508-270",
"trust": 0.7
},
{
"db": "XF",
"id": "21884",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20050817 CISCO SECURITY ADVISORY: CISCO CLEAN ACCESS UNAUTHENTICATED API ACCESS",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-13840",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2005-2631",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "39472",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-13840"
},
{
"db": "VULMON",
"id": "CVE-2005-2631"
},
{
"db": "BID",
"id": "14585"
},
{
"db": "PACKETSTORM",
"id": "39472"
},
{
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
]
},
"id": "VAR-200508-0080",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-13840"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:54:15.672000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Cisco: Cisco Clean Access Unauthenticated API Access",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20050817-cca"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2005-2631"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2005-2631"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml"
},
{
"trust": 1.9,
"url": "http://secunia.com/advisories/16472/"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/14585"
},
{
"trust": 1.2,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21884"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/21884"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00804f3127.shtml"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=9613"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/5561/"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/cca-patches"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_vacancies/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-13840"
},
{
"db": "VULMON",
"id": "CVE-2005-2631"
},
{
"db": "BID",
"id": "14585"
},
{
"db": "PACKETSTORM",
"id": "39472"
},
{
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-13840"
},
{
"db": "VULMON",
"id": "CVE-2005-2631"
},
{
"db": "BID",
"id": "14585"
},
{
"db": "PACKETSTORM",
"id": "39472"
},
{
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2005-08-23T00:00:00",
"db": "VULHUB",
"id": "VHN-13840"
},
{
"date": "2005-08-23T00:00:00",
"db": "VULMON",
"id": "CVE-2005-2631"
},
{
"date": "2005-08-17T00:00:00",
"db": "BID",
"id": "14585"
},
{
"date": "2005-08-19T04:15:49",
"db": "PACKETSTORM",
"id": "39472"
},
{
"date": "2005-08-23T04:00:00",
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"date": "2005-08-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-13840"
},
{
"date": "2018-10-30T00:00:00",
"db": "VULMON",
"id": "CVE-2005-2631"
},
{
"date": "2005-08-17T00:00:00",
"db": "BID",
"id": "14585"
},
{
"date": "2018-10-30T16:26:16.280000",
"db": "NVD",
"id": "CVE-2005-2631"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Clean Access API Access verification vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access verification error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200508-270"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.