Vulnerability Note VU#397417

Secure Elements Class 5 AVR server fails to properly enforce access controls on console operations

Original Release date: 30 May 2006 | Last revised: 06 Jun 2006

Overview

The Secure Elements Class 5 AVR server fails to properly enforce access controls on console operations. This may allow a remote attacker to gain unauthorized administrative access to a server.

Description

Class 5 AVR

Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components.

Class 5 AVR client

The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server.

Class 5 AVR server

The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history.

The problem

The Class 5 AVR server fails to enforce access controls on console operations. The console performs the authentication itself.

Impact

A remote attacker may be able to gain unauthorized administrative access to a server.

Solution

Upgrade or patch
This issue has been resolved in C5 EVM 2.8.1.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Secure Elements Affected06 Feb 200630 May 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

  • CVE IDs: Unknown
  • Date Public: 30 May 2006
  • Date First Published: 30 May 2006
  • Date Last Updated: 06 Jun 2006
  • Severity Metric: 1.18
  • Document Revision: 6

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.