var-200511-0349
Vulnerability from variot
Cisco 1200, 1131, and 1240 series Access Points, when operating in Lightweight Access Point Protocol (LWAPP) mode and controlled by 2000 and 4400 series Airespace WLAN controllers running 3.1.59.24, allow remote attackers to send unencrypted traffic to a secure network using frames with the MAC address of an authenticated end host. Cisco Airespace WLAN (Wireless LAN) devices are prone to an issue that may permit unauthorized parties to access a secure network. This may bypass the security of the wireless network as it may permit unauthorized access by hosts that have not authenticated. Legitimate end hosts can still communicate encrypted with the access point.
The vulnerability is caused due to the WLAN controller accepting unencrypted traffic from end hosts even when it is configured to perform encryption.
SOLUTION: Update to version 3.1.105.0 of the WLAN Controller software.
Cisco 2000 Series WLAN Controller: http://www.cisco.com/pcgi-bin/tablebuild.pl/2000_series_Wireless_LAN_controller
Cisco 4400 Series WLAN Controller: http://www.cisco.com/pcgi-bin/tablebuild.pl/4400_series_Wireless_LAN_controller
ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20051102-lwapp.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200511-0349", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "aironet ap1200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1240", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1131", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "aironet ap1240", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1131", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "aironet ap1200", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40003.1.59.24" }, { "model": "series airespace wireless lan controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20003.1.59.24" }, { "model": "series access point", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1240" }, { "model": "series access point", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1200" }, { "model": "series access point", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1131" } ], "sources": [ { "db": "BID", "id": "15272" }, { "db": "NVD", "id": "CVE-2005-3482" }, { "db": "CNNVD", "id": "CNNVD-200511-085" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-3482" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-085" } ], "trust": 0.6 }, "cve": "CVE-2005-3482", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-14691", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-3482", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200511-085", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-14691", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-14691" }, { "db": "NVD", "id": "CVE-2005-3482" }, { "db": "CNNVD", "id": "CNNVD-200511-085" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco 1200, 1131, and 1240 series Access Points, when operating in Lightweight Access Point Protocol (LWAPP) mode and controlled by 2000 and 4400 series Airespace WLAN controllers running 3.1.59.24, allow remote attackers to send unencrypted traffic to a secure network using frames with the MAC address of an authenticated end host. Cisco Airespace WLAN (Wireless LAN) devices are prone to an issue that may permit unauthorized parties to access a secure network. This may bypass the security of the wireless network as it may permit unauthorized access by hosts that have not authenticated. Legitimate end hosts can still communicate encrypted with the access point. \n\nThe vulnerability is caused due to the WLAN controller accepting\nunencrypted traffic from end hosts even when it is configured to\nperform encryption. \n\nSOLUTION:\nUpdate to version 3.1.105.0 of the WLAN Controller software. \n\nCisco 2000 Series WLAN Controller:\nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/2000_series_Wireless_LAN_controller\n\nCisco 4400 Series WLAN Controller:\nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/4400_series_Wireless_LAN_controller\n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20051102-lwapp.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-3482" }, { "db": "BID", "id": "15272" }, { "db": "VULHUB", "id": "VHN-14691" }, { "db": "PACKETSTORM", "id": "41238" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "15272", "trust": 2.0 }, { "db": "SECUNIA", "id": "17406", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2005-2278", "trust": 1.7 }, { "db": "NVD", "id": "CVE-2005-3482", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015140", "trust": 1.7 }, { "db": "SREASON", "id": "139", "trust": 1.7 }, { "db": "OSVDB", "id": "20454", "trust": 1.7 }, { "db": "CISCO", "id": "20051102 CISCO AIRESPACE WIRELESS LAN CONTROLLERS ALLOW UNENCRYPTED NETWORK ACCESS", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200511-085", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-14691", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "41238", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-14691" }, { "db": "BID", "id": "15272" }, { "db": "PACKETSTORM", "id": "41238" }, { "db": "NVD", "id": "CVE-2005-3482" }, { "db": "CNNVD", "id": "CNNVD-200511-085" } ] }, "id": "VAR-200511-0349", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-14691" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T13:49:55.044000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-3482" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20051102-lwapp.shtml" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/15272" }, { "trust": 1.7, "url": "http://www.osvdb.org/20454" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015140" }, { "trust": 1.7, "url": "http://secunia.com/advisories/17406" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/139" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2005/2278" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2005/2278" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/4400_series_wireless_lan_controller" }, { "trust": 0.1, "url": "http://secunia.com/product/6037/" }, { "trust": 0.1, "url": "http://secunia.com/product/6035/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/17406/" }, { "trust": 0.1, "url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/2000_series_wireless_lan_controller" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/1929/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6034/" }, { "trust": 0.1, "url": "http://secunia.com/product/6036/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-14691" }, { "db": "BID", "id": "15272" }, { "db": "PACKETSTORM", "id": "41238" }, { "db": "NVD", "id": "CVE-2005-3482" }, { "db": "CNNVD", "id": "CNNVD-200511-085" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-14691" }, { "db": "BID", "id": "15272" }, { "db": "PACKETSTORM", "id": "41238" }, { "db": "NVD", "id": "CVE-2005-3482" }, { "db": "CNNVD", "id": "CNNVD-200511-085" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-11-03T00:00:00", "db": "VULHUB", "id": "VHN-14691" }, { "date": "2005-11-02T00:00:00", "db": "BID", "id": "15272" }, { "date": "2005-11-03T23:53:57", "db": "PACKETSTORM", "id": "41238" }, { "date": "2005-11-03T02:02:00", "db": "NVD", "id": "CVE-2005-3482" }, { "date": "2005-11-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200511-085" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-08T00:00:00", "db": "VULHUB", "id": "VHN-14691" }, { "date": "2005-11-02T00:00:00", "db": "BID", "id": "15272" }, { "date": "2011-03-08T02:26:35.187000", "db": "NVD", "id": "CVE-2005-3482" }, { "date": "2006-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200511-085" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-085" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Airespace wireless LAN Controller allows unencrypted network access vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-085" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200511-085" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.