Vulnerability Note VU#487617
Secure Elements Class 5 AVR server fails to properly authenticate session start messages
The Secure Elements Class 5 AVR server fails to properly authenticate "session start" messages. This may allow an attacker to cause the server to initiate TCP connections to arbitrary destinations, which can cause a denial of service to both the server and the specified target.
Class 5 AVR
Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components.
Class 5 AVR client
The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server.
Class 5 AVR server
The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history.
The Class 5 AVR server fails to properly authenticate "session start" messages.
A remote, unauthenticated attacker may be able to cause the server to initiate TCP connections to arbitrary destinations, which can cause a denial of service to both the server and the specified target.
Upgrade or patch
This issue has been resolved in C5 EVM 2.8.1.
If you are a vendor and your product is affected, let
|Vendor||Status||Date Notified||Date Updated|
|Secure Elements ||Affected||06 Feb 2006||30 May 2006|
Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.
This document was written by Will Dormann.
30 May 2006
Date First Published:
30 May 2006
Date Last Updated:
04 May 2007
If you have feedback, comments, or additional information about this vulnerability, please send us email.