2024-07-14 02:06:08 +00:00

121 lines
3.6 KiB
JSON

{
"id": "CVE-2007-0058",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-01-04T22:28:00.000",
"lastModified": "2018-10-30T16:25:04.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file."
},
{
"lang": "es",
"value": "Cisco Clean Access (CCA) 3.5.x hasta 3.5.9 y 3.6.x hasta 3.6.1.1 en el Clean Access Manager (CAM) permite a atacantes remotos evitar autenticaci\u00f3n y descargar bases de datos de respaldo manuales de su elecci\u00f3n averiguando el nombre del fichero de captura usando fuerza bruta, y posteriormente realizando una petici\u00f3n directa del fichero."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5.0",
"versionEndIncluding": "3.5.9",
"matchCriteriaId": "A7A6B855-C210-4478-B97B-EFD2C05BD168"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.6.0.0",
"versionEndIncluding": "3.6.1.1",
"matchCriteriaId": "CA5FD7EA-9D1F-417C-854A-D0D7650C1BC4"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/23556",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1017465",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/32579",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/0030",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}