VAR-200801-0009
Vulnerability from variot - Updated: 2023-12-18 14:06Cisco Application Velocity System (AVS) before 5.1.0 is installed with default passwords for some system accounts, which allows remote attackers to gain privileges. These issues stem from a design flaw that makes several accounts available to remote attackers. Successful exploits allow remote attackers to gain administrative access to vulnerable appliances. Versions prior to Cisco AVS 5.1.0 are vulnerable. Cisco is tracking these issues as Cisco Bug ID CSCsd94732. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Cisco Security Advisory: Default Passwords in the Application Velocity System
Advisory ID: cisco-sa-20080123-avs
http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml
Revision 1.0
For Public Release 2008 January 23 1600 UTC (GMT)
+---------------------------------------------------------------------
Summary
Versions of the Cisco Application Velocity System (AVS) prior to software version AVS 5.1.0 do not prompt users to modify system account passwords during the initial configuration process. Because there is no requirement to change these credentials during the initial configuration process, an attacker may be able to leverage the accounts that have default credentials, some of which have root privileges, to take full administrative control of the AVS system.
After upgrading to software version AVS 5.1.0, users will be prompted to modify these credentials.
Cisco will make free upgrade software available to address this vulnerability for affected customers. The software upgrade will be applicable only for the AVS 3120, 3180, and 3180A systems. The workaround identified in this document describes how to change the passwords in current releases of software for the AVS 3110.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0029 has been assigned to this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml. Administrators can determine the software version of the AVS appliances by logging in to the Management Station web-based user interface or from the command-line interface (CLI) of the appliance operating system.
Customers who use the AVS 3180 or 3180A Management Station can determine their node software versions by navigating to the Cluster Information Page. Each registered node will display the corresponding software version when the node is selected.
The AVS appliance version can also be determined from the host operating system by using the "Show Version" command.
The following example shows "Show Version" output for an AVS 3120 appliance that is running version 5.1.0:
velocity>Show Version
****************************************
Cisco Application Velocity System,(AVS)
----------------------------------------
AVS 3120-K9 005.001(000.034)
****************************************
The following example shows "Show Version" output for an AVS 3180 or 3180A appliance that is running version 5.1.0:
velocity>Show Version
****************************************
Cisco Application Velocity System,(AVS)
----------------------------------------
AVS 3180-MGMT 005.001(000.034)
****************************************
Products Confirmed Not Vulnerable +--------------------------------
No other Cisco products are currently known to be affected by this vulnerability.
Details
The Cisco AVS 3110 and 3120 are enterprise data center appliances for improving web application performance, measuring end-user response time, and managing application security. The Cisco AVS 3180 and 3180A Management Stations provide web-based tools for the configuration and application performance monitoring for a cluster of AVS 3110s and 3120s or individual nodes. Vulnerable versions of the AVS software do not prompt the administrator to change the passwords for these accounts, including accounts with root privileges, during the initial configuration process. Non-vulnerable versions of AVS software will now prompt administrators to change these accounts after installation.
Note: If the passwords for the AVS 3110 or 3120 are changed on the device itself and it has previously been registered with an AVS 3180 or 3180A Management Station, the node must be re-registered with the Management Station console. Otherwise, communication between the AVS 3180 or 3180A Management Station and AVS 3110 or 3120 node will be lost.
For additional details about the AVS node registration process, refer to the "Register Node" section of the Cisco AVS User's Guide.
After upgrading the appliance software to version AVS 5.1.0 and logging in for the first time, the administrator will now be prompted to change the system account passwords.
The following example shows the new password change prompts and the subsequent password change dialog for the AVS 3120 after upgrade:
velocity login: fgn
Password:
**WARNING** System wide secrets are in factory default state.
Would you like to change these now? [y/n] y changing root password
enter password:
enter password again:
changing fgn password
enter password:
enter password again:
changing DB password
enter password:
enter password again:
Please wait...The DB password change will take a few minutes.
changing node manager password
enter password:
enter password again:
changing condenser password
enter password:
enter password again:
changing console password
enter password:
enter password again:
The following example shows the new password change prompts and the subsequent password change dialog for the AVS 3180 and 3180A after upgrade:
velocity login: fgn
Password:
**WARNING** System wide secrets are in factory default state.
Would you like to change these now? [y/n] y changing root password
enter password:
enter password again:
changing fgn password
enter password:
enter password again:
changing DB password
enter password:
enter password again:
Please wait...The DB password change will take a few minutes.
changing console password
enter password:
enter password again:
This issue is documented in Cisco Bug ID CSCsd94732.
Vulnerability Scoring Details +----------------------------
Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html.
Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss.
- AVS Default Account Passwords Don't Require Change (CSCsd94732)
CVSS Base Score - 10.0 Access Vector - Network Access Complexity - Low Authentication - None Confidentiality Impact - Complete Integrity Impact - Complete Availability Impact - Complete
CVSS Temporal Score - 8.3 Exploitability - Functional Remediation Level - Official-Fix Report Confidence - Confirmed
Impact
Successful exploitation of the vulnerability may result in full administrative control of the Cisco AVS system or user-level access to the host operating system.
Software Versions and Fixes
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance.
AVS software is available for download from the following locations on cisco.com:
- AVS 3120 5.1.0 (http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3120-5.1)
- AVS 3180 5.1.0 (http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3180-5.1)
Workarounds
The following workarounds are applicable only for the AVS 3110 and are performed on the system shell. The AVS 3110 does not have a CLI. The use of strong passwords is encouraged.
Changing the Root Password +-------------------------
Complete these steps:
-
Change the root password by using the following command:
shell# passwd -
Reboot to activate the new settings by using the following command:
shell# reboot
Changing the Management Console Username and Password +----------------------------------------------------
Complete these steps:
-
Open the following file in a text editor:
$AVS_HOME/console/jboss-3.0.1_tomcat-4.0.4/server/default/deploy/ fgconsole.war/users.properties
Use the line admin=admin to set the username and password. The username appears before the equal sign (=) and the password appears after the equal sign (=). For example, to change the username to Cisco and the password to accelerate, change the admin=admin line to Cisco=accelerate.
-
If you change the username, you must also change this file:
$AVS_HOME/console/jboss-3.0.1_tomcat-4.0.4/server/default/deploy/ fgconsole.war/roles.properties
The username is set by the line that contains admin=. The username appears before the equal sign (=). For example, to change the user name to Cisco, change the admin= line to Cisco=. Do not change the text after the equal sign (=) in this file; this field specifies the account privileges. The username that you enter here must match the one in the users.properties file in the preceding step.
Changing the Database Username and Password +------------------------------------------
There are two steps required to change the database password:
- First change the database password.
- Then update the Management Console configuration file with the new database password.
Complete these steps:
-
Log in to the database using the old password, and then use the alter SQL command to change to the new password.
/usr/local/fineground/console/postgres/bin/psql -U fineground -p 5432 fgnlog Password : <old password> Welcome to psql 7.3.4, the PostgreSQL interactive terminal. Type: \copyright for distribution terms \h for help with SQL commands \? for help on internal slash commands \g or terminate with semicolon to execute query \q to quit fgnlog=# alter user fineground password '<new password>'; \q -
The username and password to access the Management Console database are set during the Management Console installation process. If you want to change these later, you can modify an XML configuration file that the Management Console server reads at start-up.
a. Open the following file in a text editor:
$AVS_HOME/console/jboss-3.0.1_tomcat-4.0.4/server/default/ deploy/postgres-service.xml Look for the following section in this file: <!--set these only if you want only default logins, not through JAAS --> <config-property name="UserName" type="java.lang.String">fineground</config-property> <config-property name="Password" type="java.lang.String">condenser</config-property>b. To change the username, change the value for the UserName configuration property (fineground in this example).
c. To change the password, change the value for the Password configuration property (condenser in this example).
d. Save and close the file.
Changing the Node Manager Password +---------------------------------
Complete these steps:
-
Log in as fgn, and then use the su command to switch to the superuser.
-
Stop the Condenser and Node Manager:
/etc/init.d/fgnpn<Tab> stopPress Tab to have the interface complete the command.
-
Go to the $AVS_HOME/perfnode/node_manager/conf directory.
-
Back up the file named passwords.
-
Change the password with the following command:
$AVS_HOME/perfnode/bin/htpasswd -bcm passwords.new admin <password>In the preceding command, passwords.new is the name of the file in which the passwords are stored. Currently only the user admin is supported.
-
Install the file with the following command:
install -m 400 -o nobody -g nobody passwords.new passwords -
Restart the appliance with the reboot command.
-
Re-register the node from the Management Console for which the node manager password was changed.
Changing the Condenser Password +------------------------------
Complete these steps:
-
Log in as fgn, and then use the su command to switch to the superuser.
-
Stop the Condenser and Node Manager:
/etc/init.d/fgnpn<TAB> stopPress Tab to have the interface complete the command.
-
Go to the $AVS_HOME/perfnode/passwd directory.
-
Backup the file named .htpasswd.
-
Change the password with the following command:
$AVS_HOME/perfnode/bin/htpasswd -bcm passwords.new fineground <password>In the preceding command, passwords.new is the name of the file in which the passwords are stored. Currently only the user fineground is supported.
-
Install the file with the following command:
install -m 400 -o nobody -g nobody passwords.new .htpasswd -
Restart the appliance with the reboot command.
-
Re-register the node from the Management Console for which the Condenser password was changed.
Obtaining Fixed Software
Cisco has released software updates that address this vulnerability. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html, or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades.
Customers with Service Contracts +-------------------------------
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations +------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed.
Customers without Service Contracts +----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows.
- +1 800 553 2447 (toll free from within North America)
- +1 408 526 7209 (toll call from anywhere in the world)
- e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC.
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory.
This vulnerability was identified through internal testing.
Status of this Notice: Final
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory is posted on Cisco's worldwide website at :
http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients.
- cust-security-announce@cisco.com
- first-teams@first.org
- bugtraq@securityfocus.com
- vulnwatch@vulnwatch.org
- cisco@spot.colorado.edu
- cisco-nsp@puck.nether.net
- full-disclosure@lists.grok.org.uk
- comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
+-------------------------------------------------------------+ | Revision 1.0 | 2008-January-23 | Initial public release | +-------------------------------------------------------------+
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
+---------------------------------------------------------------------- All contents are Copyright (C) 2006-2008 Cisco Systems, Inc. All rights reserved. +----------------------------------------------------------------------
Updated: Jan 21, 2008 Document ID: 100212
+---------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHl3j486n/Gc8U/uARArPpAJwJaihdYFR6B+ljPNEYLq6nCfluxgCbB85h UYvka5159PAAagGuJDiS10E= =PnnY -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200801-0009",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "application velocity system",
"scope": "eq",
"trust": 1.1,
"vendor": "cisco",
"version": "3180"
},
{
"model": "application velocity system",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0.1"
},
{
"model": "application velocity system 3180a",
"scope": null,
"trust": 0.9,
"vendor": "cisco",
"version": null
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3110"
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "3120"
},
{
"model": "application velocity system",
"scope": "lte",
"trust": 0.8,
"vendor": "cisco",
"version": "software 5.0.1"
},
{
"model": "application velocity system 3120",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "application velocity system 3110",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "application velocity system 3180",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "31205.0.1"
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "31205.0"
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "31105.0.1"
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "31105.0"
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "31104.0"
},
{
"model": "application velocity system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "application velocity system avs",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3100"
},
{
"model": "application velocity system",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1"
}
],
"sources": [
{
"db": "BID",
"id": "27421"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:application_velocity_system_3110:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:application_velocity_system_3120:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:application_velocity_system_3180:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:application_velocity_system_3180a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:application_velocity_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.0.1",
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2008-0029"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Security bulletin",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
],
"trust": 0.6
},
"cve": "CVE-2008-0029",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2008-0029",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-30154",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2008-0029",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200801-376",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-30154",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-30154"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Application Velocity System (AVS) before 5.1.0 is installed with default passwords for some system accounts, which allows remote attackers to gain privileges. These issues stem from a design flaw that makes several accounts available to remote attackers. \nSuccessful exploits allow remote attackers to gain administrative access to vulnerable appliances. \nVersions prior to Cisco AVS 5.1.0 are vulnerable. \nCisco is tracking these issues as Cisco Bug ID CSCsd94732. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nCisco Security Advisory: Default Passwords in the Application Velocity\nSystem\n\nAdvisory ID: cisco-sa-20080123-avs\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml\n\nRevision 1.0\n\nFor Public Release 2008 January 23 1600 UTC (GMT)\n\n+---------------------------------------------------------------------\n\nSummary\n=======\n\nVersions of the Cisco Application Velocity System (AVS) prior to\nsoftware version AVS 5.1.0 do not prompt users to modify system account\npasswords during the initial configuration process. Because there is no\nrequirement to change these credentials during the initial configuration\nprocess, an attacker may be able to leverage the accounts that have\ndefault credentials, some of which have root privileges, to take full\nadministrative control of the AVS system. \n\nAfter upgrading to software version AVS 5.1.0, users will be prompted to\nmodify these credentials. \n\nCisco will make free upgrade software available to address this\nvulnerability for affected customers. The software upgrade will\nbe applicable only for the AVS 3120, 3180, and 3180A systems. The\nworkaround identified in this document describes how to change the\npasswords in current releases of software for the AVS 3110. \n\nCommon Vulnerabilities and Exposures (CVE) identifier CVE-2008-0029 has\nbeen assigned to this vulnerability. \n\nThis advisory is posted at\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml. Administrators can determine the software version of the\nAVS appliances by logging in to the Management Station web-based user\ninterface or from the command-line interface (CLI) of the appliance\noperating system. \n\nCustomers who use the AVS 3180 or 3180A Management Station can determine\ntheir node software versions by navigating to the Cluster Information\nPage. Each registered node will display the corresponding software\nversion when the node is selected. \n\nThe AVS appliance version can also be determined from the host operating\nsystem by using the \"Show Version\" command. \n\nThe following example shows \"Show Version\" output for an AVS 3120\nappliance that is running version 5.1.0:\n\n velocity\u003eShow Version\n\n ****************************************\n Cisco Application Velocity System,(AVS)\n ----------------------------------------\n AVS 3120-K9 005.001(000.034)\n ****************************************\n\nThe following example shows \"Show Version\" output for an AVS 3180 or\n3180A appliance that is running version 5.1.0:\n\n velocity\u003eShow Version\n\n ****************************************\n Cisco Application Velocity System,(AVS)\n ----------------------------------------\n AVS 3180-MGMT 005.001(000.034)\n ****************************************\n\nProducts Confirmed Not Vulnerable\n+--------------------------------\n\nNo other Cisco products are currently known to be affected by this\nvulnerability. \n\nDetails\n=======\n\nThe Cisco AVS 3110 and 3120 are enterprise data center appliances for\nimproving web application performance, measuring end-user response\ntime, and managing application security. The\nCisco AVS 3180 and 3180A Management Stations provide web-based tools for\nthe configuration and application performance monitoring for a cluster\nof AVS 3110s and 3120s or individual nodes. \nVulnerable versions of the AVS software do not prompt the administrator\nto change the passwords for these accounts, including accounts with root\nprivileges, during the initial configuration process. Non-vulnerable\nversions of AVS software will now prompt administrators to change these\naccounts after installation. \n\nNote: If the passwords for the AVS 3110 or 3120 are changed on the\ndevice itself and it has previously been registered with an AVS 3180\nor 3180A Management Station, the node must be re-registered with the\nManagement Station console. Otherwise, communication between the AVS\n3180 or 3180A Management Station and AVS 3110 or 3120 node will be lost. \n\nFor additional details about the AVS node registration process, refer to\nthe \"Register Node\" section of the Cisco AVS User\u0027s Guide. \n\nAfter upgrading the appliance software to version AVS 5.1.0 and logging\nin for the first time, the administrator will now be prompted to change\nthe system account passwords. \n\nThe following example shows the new password change prompts and the\nsubsequent password change dialog for the AVS 3120 after upgrade:\n\n velocity login: fgn\n Password:\n **WARNING** System wide secrets are in factory default state. \n Would you like to change these now? [y/n] y changing root password\n enter password:\n enter password again:\n changing fgn password\n enter password:\n enter password again:\n changing DB password\n enter password:\n enter password again:\n\n Please wait...The DB password change will take a few minutes. \n changing node manager password\n enter password:\n enter password again:\n changing condenser password\n enter password:\n enter password again:\n changing console password\n enter password:\n enter password again:\n\nThe following example shows the new password change prompts and the\nsubsequent password change dialog for the AVS 3180 and 3180A after\nupgrade:\n\n velocity login: fgn\n Password:\n **WARNING** System wide secrets are in factory default state. \n Would you like to change these now? [y/n] y changing root password\n enter password:\n enter password again:\n changing fgn password\n enter password:\n enter password again:\n changing DB password\n enter password:\n enter password again:\n\n Please wait...The DB password change will take a few minutes. \n changing console password\n enter password:\n enter password again:\n\nThis issue is documented in Cisco Bug ID CSCsd94732. \n\nVulnerability Scoring Details\n+----------------------------\n\nCisco has provided scores for the vulnerabilities in this advisory based\non the Common Vulnerability Scoring System (CVSS). The CVSS scoring in\nthis Security Advisory is done in accordance with CVSS version 2.0. \n\nCVSS is a standards-based scoring method that conveys vulnerability\nseverity and helps determine urgency and priority of response. \n\nCisco has provided a base and temporal score. Customers can then\ncompute environmental scores to assist in determining the impact of the\nvulnerability in individual networks. \n\nCisco has provided an FAQ to answer additional questions regarding CVSS\nat\n\nhttp://www.cisco.com/web/about/security/intelligence/cvss-qandas.html. \n\nCisco has also provided a CVSS calculator to help compute the\nenvironmental impact for individual networks at\n\nhttp://intellishield.cisco.com/security/alertmanager/cvss. \n\n* AVS Default Account Passwords Don\u0027t Require Change (CSCsd94732)\n\nCVSS Base Score - 10.0\n Access Vector - Network\n Access Complexity - Low\n Authentication - None\n Confidentiality Impact - Complete\n Integrity Impact - Complete\n Availability Impact - Complete\n\nCVSS Temporal Score - 8.3\n Exploitability - Functional\n Remediation Level - Official-Fix\n Report Confidence - Confirmed\n\nImpact\n======\n\nSuccessful exploitation of the vulnerability may result in full\nadministrative control of the Cisco AVS system or user-level access to\nthe host operating system. \n\nSoftware Versions and Fixes\n===========================\n\nWhen considering software upgrades, also consult\nhttp://www.cisco.com/go/psirt and any subsequent advisories to determine\nexposure and a complete upgrade solution. \n\nIn all cases, customers should exercise caution to be certain the\ndevices to be upgraded contain sufficient memory and that current\nhardware and software configurations will continue to be supported\nproperly by the new release. If the information is not clear, contact\nthe Cisco Technical Assistance Center (TAC) or your contracted\nmaintenance provider for assistance. \n\nAVS software is available for download from the following locations on\ncisco.com:\n\n * AVS 3120 5.1.0 (http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3120-5.1)\n * AVS 3180 5.1.0 (http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3180-5.1)\n\nWorkarounds\n===========\n\nThe following workarounds are applicable only for the AVS 3110 and are\nperformed on the system shell. The AVS 3110 does not have a CLI. The use\nof strong passwords is encouraged. \n\nChanging the Root Password\n+-------------------------\n\nComplete these steps:\n\n 1. Change the root password by using the following command:\n\n shell# passwd\n\n\n 2. Reboot to activate the new settings by using the following command:\n\n shell# reboot\n\nChanging the Management Console Username and Password\n+----------------------------------------------------\n\nComplete these steps:\n\n 1. Open the following file in a text editor:\n\n $AVS_HOME/console/jboss-3.0.1_tomcat-4.0.4/server/default/deploy/\n fgconsole.war/users.properties\n\n Use the line admin=admin to set the username and password. The\n username appears before the equal sign (=) and the password appears\n after the equal sign (=). For example, to change the username to\n Cisco and the password to accelerate, change the admin=admin line\n to Cisco=accelerate. \n\n 2. If you change the username, you must also change this file:\n\n $AVS_HOME/console/jboss-3.0.1_tomcat-4.0.4/server/default/deploy/\n fgconsole.war/roles.properties\n\n The username is set by the line that contains admin=. The username\n appears before the equal sign (=). For example, to change the user\n name to Cisco, change the admin= line to Cisco=. Do not change the\n text after the equal sign (=) in this file; this field specifies\n the account privileges. The username that you enter here must match\n the one in the users.properties file in the preceding step. \n\nChanging the Database Username and Password\n+------------------------------------------\n\nThere are two steps required to change the database password:\n\n 1. First change the database password. \n 2. Then update the Management Console configuration file with the new\n database password. \n\nComplete these steps:\n\n 1. Log in to the database using the old password, and then use the\n alter SQL command to change to the new password. \n\n /usr/local/fineground/console/postgres/bin/psql\n -U fineground -p 5432 fgnlog Password : \u003cold password\u003e\n Welcome to psql 7.3.4, the PostgreSQL interactive terminal. \n\n Type: \\copyright for distribution terms\n \\h for help with SQL commands\n \\? for help on internal slash commands\n \\g or terminate with semicolon to execute query\n \\q to quit\n fgnlog=# alter user fineground password \u0027\u003cnew password\u003e\u0027; \\q\n\n 2. The username and password to access the Management Console database\n are set during the Management Console installation process. If you\n want to change these later, you can modify an XML configuration\n file that the Management Console server reads at start-up. \n\n a. Open the following file in a text editor:\n\n $AVS_HOME/console/jboss-3.0.1_tomcat-4.0.4/server/default/\n deploy/postgres-service.xml\n\n Look for the following section in this file:\n\n \u003c!--set these only if you want only default logins,\n not through JAAS --\u003e\n \u003cconfig-property name=\"UserName\" type=\"java.lang.String\"\u003efineground\u003c/config-property\u003e\n \u003cconfig-property name=\"Password\" type=\"java.lang.String\"\u003econdenser\u003c/config-property\u003e\n\n b. To change the username, change the value for the UserName\n configuration property (fineground in this example). \n\n c. To change the password, change the value for the Password\n configuration property (condenser in this example). \n\n d. Save and close the file. \n\nChanging the Node Manager Password\n+---------------------------------\n\nComplete these steps:\n\n 1. Log in as fgn, and then use the su command to switch to the\n superuser. \n\n 2. Stop the Condenser and Node Manager:\n\n /etc/init.d/fgnpn\u003cTab\u003e stop\n\n Press Tab to have the interface complete the command. \n\n 3. Go to the $AVS_HOME/perfnode/node_manager/conf directory. \n\n 4. Back up the file named passwords. \n\n 5. Change the password with the following command:\n\n $AVS_HOME/perfnode/bin/htpasswd -bcm passwords.new admin \u003cpassword\u003e\n\n In the preceding command, passwords.new is the name of the file in\n which the passwords are stored. Currently only the user admin is\n supported. \n\n 6. Install the file with the following command:\n\n install -m 400 -o nobody -g nobody passwords.new passwords\n\n 7. Restart the appliance with the reboot command. \n\n 8. Re-register the node from the Management Console for which the node\n manager password was changed. \n\nChanging the Condenser Password\n+------------------------------\n\nComplete these steps:\n\n 1. Log in as fgn, and then use the su command to switch to the\n superuser. \n\n 2. Stop the Condenser and Node Manager:\n\n /etc/init.d/fgnpn\u003cTAB\u003e stop\n\n Press Tab to have the interface complete the command. \n\n 3. Go to the $AVS_HOME/perfnode/passwd directory. \n\n 4. Backup the file named .htpasswd. \n\n 5. Change the password with the following command:\n\n $AVS_HOME/perfnode/bin/htpasswd -bcm passwords.new fineground \u003cpassword\u003e\n\n In the preceding command, passwords.new is the name of the file in\n which the passwords are stored. Currently only the user fineground\n is supported. \n\n 6. Install the file with the following command:\n\n install -m 400 -o nobody -g nobody passwords.new .htpasswd\n\n 7. Restart the appliance with the reboot command. \n\n 8. Re-register the node from the Management Console for which the\n Condenser password was changed. \n\nObtaining Fixed Software\n========================\n\nCisco has released software updates that address this vulnerability. \nPrior to deploying software, customers should consult their maintenance\nprovider or check the software for feature set compatibility and known\nissues specific to their environment. \n\nCustomers may only install and expect support for the feature\nsets they have purchased. By installing, downloading, accessing\nor otherwise using such software upgrades, customers agree to be\nbound by the terms of Cisco\u0027s software license terms found at\nhttp://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html,\nor as otherwise set forth at Cisco.com Downloads at\nhttp://www.cisco.com/public/sw-center/sw-usingswc.shtml. \n\nDo not contact psirt@cisco.com or security-alert@cisco.com for software\nupgrades. \n\nCustomers with Service Contracts\n+-------------------------------\n\nCustomers with contracts should obtain upgraded software through their\nregular update channels. For most customers, this means that upgrades\nshould be obtained through the Software Center on Cisco\u0027s worldwide\nwebsite at http://www.cisco.com. \n\nCustomers using Third Party Support Organizations\n+------------------------------------------------\n\nCustomers whose Cisco products are provided or maintained through prior\nor existing agreements with third-party support organizations, such\nas Cisco Partners, authorized resellers, or service providers should\ncontact that support organization for guidance and assistance with the\nappropriate course of action in regards to this advisory. \n\nThe effectiveness of any workaround or fix is dependent on specific\ncustomer situations, such as product mix, network topology, traffic\nbehavior, and organizational mission. Due to the variety of affected\nproducts and releases, customers should consult with their service\nprovider or support organization to ensure any applied workaround or fix\nis the most appropriate for use in the intended network before it is\ndeployed. \n\nCustomers without Service Contracts\n+----------------------------------\n\nCustomers who purchase direct from Cisco but do not hold a Cisco service\ncontract, and customers who purchase through third-party vendors but are\nunsuccessful in obtaining fixed software through their point of sale\nshould acquire upgrades by contacting the Cisco Technical Assistance\nCenter (TAC). TAC contacts are as follows. \n\n * +1 800 553 2447 (toll free from within North America)\n * +1 408 526 7209 (toll call from anywhere in the world)\n * e-mail: tac@cisco.com\n\nCustomers should have their product serial number available and be\nprepared to give the URL of this notice as evidence of entitlement to a\nfree upgrade. Free upgrades for non-contract customers must be requested\nthrough the TAC. \n\nRefer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml\nfor additional TAC contact information, including localized telephone\nnumbers, and instructions and e-mail addresses for use in various\nlanguages. \n\nExploitation and Public Announcements\n=====================================\n\nThe Cisco PSIRT is not aware of any public announcements or malicious\nuse of the vulnerability described in this advisory. \n\nThis vulnerability was identified through internal testing. \n\nStatus of this Notice: Final\n============================\n\nTHIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY\nANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\nDOCUMENT AT ANY TIME. \n\nA stand-alone copy or Paraphrase of the text of this document that omits\nthe distribution URL in the following section is an uncontrolled copy,\nand may lack important information or contain factual errors. \n\nDistribution\n============\n\nThis advisory is posted on Cisco\u0027s worldwide website at :\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml\n\nIn addition to worldwide web posting, a text version of this notice is\nclear-signed with the Cisco PSIRT PGP key and is posted to the following\ne-mail and Usenet news recipients. \n\n * cust-security-announce@cisco.com\n * first-teams@first.org\n * bugtraq@securityfocus.com\n * vulnwatch@vulnwatch.org\n * cisco@spot.colorado.edu\n * cisco-nsp@puck.nether.net\n * full-disclosure@lists.grok.org.uk\n * comp.dcom.sys.cisco@newsgate.cisco.com\n\nFuture updates of this advisory, if any, will be placed on Cisco\u0027s\nworldwide website, but may or may not be actively announced on mailing\nlists or newsgroups. Users concerned about this problem are encouraged\nto check the above URL for any updates. \n\nRevision History\n================\n\n+-------------------------------------------------------------+\n| Revision 1.0 | 2008-January-23 | Initial public release |\n+-------------------------------------------------------------+\n\nCisco Security Procedures\n=========================\n\nComplete information on reporting security vulnerabilities\nin Cisco products, obtaining assistance with security\nincidents, and registering to receive security information\nfrom Cisco, is available on Cisco\u0027s worldwide website at\nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. \nThis includes instructions for press inquiries regarding\nCisco security notices. All Cisco security advisories are available at\nhttp://www.cisco.com/go/psirt. \n\n+----------------------------------------------------------------------\nAll contents are Copyright (C) 2006-2008 Cisco Systems, Inc. All rights\nreserved. \n+----------------------------------------------------------------------\n\nUpdated: Jan 21, 2008 Document ID: 100212\n\n+----------------------------------------------------------------------\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFHl3j486n/Gc8U/uARArPpAJwJaihdYFR6B+ljPNEYLq6nCfluxgCbB85h\nUYvka5159PAAagGuJDiS10E=\n=PnnY\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"db": "BID",
"id": "27421"
},
{
"db": "VULHUB",
"id": "VHN-30154"
},
{
"db": "PACKETSTORM",
"id": "62923"
}
],
"trust": 2.07
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-30154",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-30154"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-0029",
"trust": 2.9
},
{
"db": "BID",
"id": "27421",
"trust": 2.0
},
{
"db": "SECTRACK",
"id": "1019259",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-0260",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200801-376",
"trust": 0.7
},
{
"db": "XF",
"id": "39860",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20080123 DEFAULT PASSWORDS IN THE APPLICATION VELOCITY SYSTEM",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "62923",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-30154",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-30154"
},
{
"db": "BID",
"id": "27421"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"db": "PACKETSTORM",
"id": "62923"
},
{
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
]
},
"id": "VAR-200801-0009",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-30154"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T14:06:42.317000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20080123-avs",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-30154"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"db": "NVD",
"id": "CVE-2008-0029"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/27421"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1019259"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/0260"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39860"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0029"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0029"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/39860"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/0260"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/ps6492/index.html"
},
{
"trust": 0.3,
"url": "/archive/1/486871"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0029"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/prod_warranties_item09186a008088e31f.html,"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/687/directory/dirtac.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/avs3180-5.1)"
},
{
"trust": 0.1,
"url": "http://intellishield.cisco.com/security/alertmanager/cvss."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-avs.shtml."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/public/sw-center/sw-usingswc.shtml."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/avs3120-5.1)"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-30154"
},
{
"db": "BID",
"id": "27421"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"db": "PACKETSTORM",
"id": "62923"
},
{
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-30154"
},
{
"db": "BID",
"id": "27421"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"db": "PACKETSTORM",
"id": "62923"
},
{
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-01-23T00:00:00",
"db": "VULHUB",
"id": "VHN-30154"
},
{
"date": "2008-01-23T00:00:00",
"db": "BID",
"id": "27421"
},
{
"date": "2008-12-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"date": "2008-01-24T04:25:41",
"db": "PACKETSTORM",
"id": "62923"
},
{
"date": "2008-01-23T21:00:00",
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"date": "2008-01-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-08T00:00:00",
"db": "VULHUB",
"id": "VHN-30154"
},
{
"date": "2008-01-24T18:08:00",
"db": "BID",
"id": "27421"
},
{
"date": "2008-12-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-002033"
},
{
"date": "2017-08-08T01:29:19.117000",
"db": "NVD",
"id": "CVE-2008-0029"
},
{
"date": "2008-09-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Application Velocity System (AVS) Elevation of privilege vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-002033"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200801-376"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.