René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

83 lines
2.4 KiB
JSON

{
"id": "CVE-2006-4983",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-26T02:07:00.000",
"lastModified": "2018-10-17T21:40:44.857",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cisco NAC allows quarantined devices to communicate over the network with (1) DNS, (2) DHCP, and (3) EAPoUDP, which allows attackers to bypass control methods by tunneling network traffic through one of these protocols."
},
{
"lang": "es",
"value": "Cisco NAC permite a dispositivos en cuarentena comunicarse a trav\u00e9s de la red con (1) DNS, (2) DHCP, y (3) EAPoUDP, lo cual permite a atacantes remotos evitar los m\u00e9todos de control pasando el tr\u00e1fico de la red a trav\u00e9s de uno de estos protocolos."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:network_access_control:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA567228-118D-4A98-BFCC-D86F12F39D69"
}
]
}
]
}
],
"references": [
{
"url": "http://www.insightix.com/files/pdf/Bypassing_NAC_Solutions_Whitepaper.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/446421/100/0/threaded",
"source": "cve@mitre.org"
}
]
}