ID

VAR-200511-0349


CVE

CVE-2005-3482


TITLE

Cisco Airespace wireless LAN Controller allows unencrypted network access vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200511-085

DESCRIPTION

Cisco 1200, 1131, and 1240 series Access Points, when operating in Lightweight Access Point Protocol (LWAPP) mode and controlled by 2000 and 4400 series Airespace WLAN controllers running 3.1.59.24, allow remote attackers to send unencrypted traffic to a secure network using frames with the MAC address of an authenticated end host. Cisco Airespace WLAN (Wireless LAN) devices are prone to an issue that may permit unauthorized parties to access a secure network. This may bypass the security of the wireless network as it may permit unauthorized access by hosts that have not authenticated. Legitimate end hosts can still communicate encrypted with the access point. The vulnerability is caused due to the WLAN controller accepting unencrypted traffic from end hosts even when it is configured to perform encryption. SOLUTION: Update to version 3.1.105.0 of the WLAN Controller software. Cisco 2000 Series WLAN Controller: http://www.cisco.com/pcgi-bin/tablebuild.pl/2000_series_Wireless_LAN_controller Cisco 4400 Series WLAN Controller: http://www.cisco.com/pcgi-bin/tablebuild.pl/4400_series_Wireless_LAN_controller ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20051102-lwapp.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-3482 // BID: 15272 // VULHUB: VHN-14691 // PACKETSTORM: 41238

AFFECTED PRODUCTS

vendor:ciscomodel:aironet ap1131scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:aironet ap1200scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:aironet ap1240scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:aironet ap1240scope: - version: -

Trust: 0.6

vendor:ciscomodel:aironet ap1131scope: - version: -

Trust: 0.6

vendor:ciscomodel:aironet ap1200scope: - version: -

Trust: 0.6

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:40003.1.59.24

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:20003.1.59.24

Trust: 0.3

vendor:ciscomodel:series access pointscope:eqversion:1240

Trust: 0.3

vendor:ciscomodel:series access pointscope:eqversion:1200

Trust: 0.3

vendor:ciscomodel:series access pointscope:eqversion:1131

Trust: 0.3

sources: BID: 15272 // CNNVD: CNNVD-200511-085 // NVD: CVE-2005-3482

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3482
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200511-085
value: MEDIUM

Trust: 0.6

VULHUB: VHN-14691
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-3482
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14691
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14691 // CNNVD: CNNVD-200511-085 // NVD: CVE-2005-3482

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3482

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200511-085

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200511-085

EXTERNAL IDS

db:BIDid:15272

Trust: 2.0

db:SECUNIAid:17406

Trust: 1.8

db:VUPENid:ADV-2005-2278

Trust: 1.7

db:NVDid:CVE-2005-3482

Trust: 1.7

db:SECTRACKid:1015140

Trust: 1.7

db:SREASONid:139

Trust: 1.7

db:OSVDBid:20454

Trust: 1.7

db:CISCOid:20051102 CISCO AIRESPACE WIRELESS LAN CONTROLLERS ALLOW UNENCRYPTED NETWORK ACCESS

Trust: 0.6

db:CNNVDid:CNNVD-200511-085

Trust: 0.6

db:VULHUBid:VHN-14691

Trust: 0.1

db:PACKETSTORMid:41238

Trust: 0.1

sources: VULHUB: VHN-14691 // BID: 15272 // PACKETSTORM: 41238 // CNNVD: CNNVD-200511-085 // NVD: CVE-2005-3482

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20051102-lwapp.shtml

Trust: 2.1

url:http://www.securityfocus.com/bid/15272

Trust: 1.7

url:http://www.osvdb.org/20454

Trust: 1.7

url:http://securitytracker.com/id?1015140

Trust: 1.7

url:http://secunia.com/advisories/17406

Trust: 1.7

url:http://securityreason.com/securityalert/139

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/2278

Trust: 1.1

url:http://www.frsirt.com/english/advisories/2005/2278

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/4400_series_wireless_lan_controller

Trust: 0.1

url:http://secunia.com/product/6037/

Trust: 0.1

url:http://secunia.com/product/6035/

Trust: 0.1

url:http://secunia.com/advisories/17406/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/2000_series_wireless_lan_controller

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/1929/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6034/

Trust: 0.1

url:http://secunia.com/product/6036/

Trust: 0.1

sources: VULHUB: VHN-14691 // BID: 15272 // PACKETSTORM: 41238 // CNNVD: CNNVD-200511-085 // NVD: CVE-2005-3482

CREDITS

Cisco

Trust: 0.6

sources: CNNVD: CNNVD-200511-085

SOURCES

db:VULHUBid:VHN-14691
db:BIDid:15272
db:PACKETSTORMid:41238
db:CNNVDid:CNNVD-200511-085
db:NVDid:CVE-2005-3482

LAST UPDATE DATE

2024-08-14T14:08:46.237000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14691date:2011-03-08T00:00:00
db:BIDid:15272date:2005-11-02T00:00:00
db:CNNVDid:CNNVD-200511-085date:2006-06-12T00:00:00
db:NVDid:CVE-2005-3482date:2011-03-08T02:26:35.187

SOURCES RELEASE DATE

db:VULHUBid:VHN-14691date:2005-11-03T00:00:00
db:BIDid:15272date:2005-11-02T00:00:00
db:PACKETSTORMid:41238date:2005-11-03T23:53:57
db:CNNVDid:CNNVD-200511-085date:2005-11-02T00:00:00
db:NVDid:CVE-2005-3482date:2005-11-03T02:02:00