140 lines
4.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-2695",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-08-26T15:50:00.000",
"lastModified": "2024-11-21T00:00:10.337",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the SSL certificate checking functionality in Cisco CiscoWorks Management Center for IDS Sensors (IDSMC) 2.0 and 2.1, and Monitoring Center for Security (Security Monitor or Secmon) 1.1 through 2.0 and 2.1, allows remote attackers to spoof a Cisco Intrusion Detection Sensor (IDS) or Intrusion Prevention System (IPS)."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ciscoworks_management_center_for_ids_sensors:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "17EB51B4-A164-42AB-A22F-7C8A1B7120DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ciscoworks_management_center_for_ids_sensors:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AA4E05-5723-4347-87D3-67F1CA9A3599"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ciscoworks_monitoring_center_for_security:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF0E187-739B-4BF9-AEFD-1111A0B6C193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ciscoworks_monitoring_center_for_security:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8CA331E-7234-476B-AB52-99DD917CA6C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ciscoworks_monitoring_center_for_security:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E48751A6-FE1A-483F-A38E-2446A42B8789"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/16544/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20050824-idsmc.shtml",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/14628",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21946",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/16544/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20050824-idsmc.shtml",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/14628",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21946",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}