Secure Elements Class 5 AVR client fails to enforce integrity of message digests

2006-05-30T00:00:00
ID VU:353769
Type cert
Reporter CERT
Modified 2006-06-06T00:00:00

Description

Overview

The Secure Elements Class 5 AVR client fails to enforce integrity of message digests. This may allow an attacker to replay modified messages to a vulnerable client.

Description

Class 5 AVR

Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components.

Class 5 AVR client

The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server.

Class 5 AVR server

The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history.

The problem

The Class 5 AVR client does not enforce the integrity of message digests.


Impact

A remote attacker may be able to modify and replay messages to a vulnerable client.


Solution

Upgrade or patch
This issue has been resolved in C5 EVM 2.8.1.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Secure Elements | | 06 Feb 2006| 26 May 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://www.secure-elements.com/products/index.htm>

Credit

Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

  • CVE IDs: Unknown
  • Date Public: 30 May 2006
  • Date First Published: 30 May 2006
  • Date Last Updated: 06 Jun 2006
  • Severity Metric: 0.35
  • Document Revision: 6