ID
VAR-E-200504-0453
CVE
cve_id: | CVE-2005-1057 | Trust: 0.3 |
TITLE
Cisco IOS Easy VPN Server XAUTH Authentication Bypass Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS Easy VPN Server is reported prone to an authentication bypass vulnerability. This issue can allow remote attackers to bypass Extended Authentication (XAUTH) and gain unauthorized access to resources.
An unauthorized attacker may send certain malformed UDP packets to UDP port 500 to complete XAUTH authentication and gain unauthorized access to network resources.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.2zj | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.2yw | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.2xk | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.2cx | scope: | - | version: | - | Trust: 0.9 |
vendor: | cisco | model: | ios 12.2zh | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zg | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zf | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2ze | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zd | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zc | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2zb | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yy | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yx | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yv | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yu | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yt | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yp | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2yn | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2ym | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2xj | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.2sy | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2su | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2by | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
This issue was reported by the vendor.
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2005-1057 | Trust: 0.3 |
db: | BID | id: | 13031 | Trust: 0.3 |
SOURCES
db: | BID | id: | 13031 |
LAST UPDATE DATE
2022-07-27T09:23:35.006000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 13031 | date: | 2009-07-12T11:57:00 |
SOURCES RELEASE DATE
db: | BID | id: | 13031 | date: | 2005-04-06T00:00:00 |