ID

VAR-200512-0658


CVE

CVE-2005-3253


TITLE

WEP Key Authentication Bypass Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200512-341

DESCRIPTION

Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of "12345", which allows remote attackers to bypass authentication. Both Avaya wireless AP and Proxim wireless AP are very popular wireless access devices. The problem is caused due to the presence of a static WEP key set to "12345". This can be exploited to bypass the 802.1x authentication process. Successful exploitation allows access to network resources. The security issue affects the following products: * Avaya Wireless Access Points AP-3, AP-4, AP-5, and AP-6 (All versions after 2.5 to 2.5.4) * Avaya Wireless Access Points AP-7 and AP-8 (All versions after 2.5 and prior to 3.1) SOLUTION: Avaya Wireless AP-3: Apply Software Update 2.5.5 for AP3. http://support.avaya.com/japple/css/japple?temp.documentID=280939&temp.productID=107770&temp.bucketID=108025&PAGE=Document Avaya Wireless AP-4, 5, and 6: Apply Software Update 2.5.5 for AP4, 5, and 6. http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document Avaya Wireless AP-7: Apply Software Update 3.1 for AP7. http://support.avaya.com/japple/css/japple?temp.documentID=280946&temp.productID=107770&temp.bucketID=108025&PAGE=Document Avaya Wireless AP-8: Apply Software Update 2.5.5 for AP4, 5, and 6. http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document PROVIDED AND/OR DISCOVERED BY: Urmas Kahar and Tarmo Kaljumae ORIGINAL ADVISORY: http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.17

sources: NVD: CVE-2005-3253 // VULHUB: VHN-14462 // PACKETSTORM: 42570 // PACKETSTORM: 42357

AFFECTED PRODUCTS

vendor:avayamodel:wireless ap-7scope:eqversion:2.5

Trust: 1.6

vendor:avayamodel:wireless ap-5scope:eqversion:2.5

Trust: 1.6

vendor:avayamodel:wireless ap-8scope:eqversion:2.5

Trust: 1.6

vendor:avayamodel:wireless ap-6scope:eqversion:2.5

Trust: 1.6

vendor:avayamodel:wireless ap-3scope:eqversion:2.5.4

Trust: 1.6

vendor:avayamodel:wireless ap-6scope:eqversion:2.5.4

Trust: 1.6

vendor:avayamodel:wireless ap-5scope:eqversion:2.5.4

Trust: 1.6

vendor:avayamodel:wireless ap-4scope:eqversion:2.5

Trust: 1.6

vendor:avayamodel:wireless ap-4scope:eqversion:2.5.4

Trust: 1.6

vendor:avayamodel:wireless ap-3scope:eqversion:2.5

Trust: 1.6

vendor:proximmodel:ap-2000scope:eqversion:2.5.4

Trust: 1.0

vendor:proximmodel:ap-600scope:eqversion:2.5.4

Trust: 1.0

vendor:proximmodel:ap-700scope:eqversion:2.4.12

Trust: 1.0

vendor:proximmodel:ap-4000scope:eqversion:2.4.12

Trust: 1.0

vendor:proximmodel:ap-700scope:eqversion:3.0

Trust: 1.0

vendor:proximmodel:ap-4000scope:eqversion:3.0

Trust: 1.0

sources: CNNVD: CNNVD-200512-341 // NVD: CVE-2005-3253

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3253
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200512-341
value: HIGH

Trust: 0.6

VULHUB: VHN-14462
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-3253
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14462
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14462 // CNNVD: CNNVD-200512-341 // NVD: CVE-2005-3253

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3253

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-341

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200512-341

EXTERNAL IDS

db:SECUNIAid:18057

Trust: 1.8

db:SECUNIAid:18047

Trust: 1.8

db:NVDid:CVE-2005-3253

Trust: 1.7

db:VUPENid:ADV-2005-2931

Trust: 1.7

db:OSVDBid:22091

Trust: 1.7

db:CNNVDid:CNNVD-200512-341

Trust: 0.7

db:VULHUBid:VHN-14462

Trust: 0.1

db:PACKETSTORMid:42570

Trust: 0.1

db:PACKETSTORMid:42357

Trust: 0.1

sources: VULHUB: VHN-14462 // PACKETSTORM: 42570 // PACKETSTORM: 42357 // CNNVD: CNNVD-200512-341 // NVD: CVE-2005-3253

REFERENCES

url:http://keygen.proxim.com/support/cs/documents/802.1x_vulnerability.pdf

Trust: 1.8

url:http://support.avaya.com/elmodocs2/security/asa-2005-233.pdf

Trust: 1.8

url:http://www.osvdb.org/22091

Trust: 1.7

url:http://secunia.com/advisories/18047

Trust: 1.7

url:http://secunia.com/advisories/18057

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/2931

Trust: 1.1

url:http://www.frsirt.com/english/advisories/2005/2931

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/18047/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1250

Trust: 0.1

url:http://secunia.com/product/6679/

Trust: 0.1

url:http://secunia.com/product/6680/

Trust: 0.1

url:http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1222

Trust: 0.1

url:http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1221

Trust: 0.1

url:http://secunia.com/product/6681/

Trust: 0.1

url:http://secunia.com/product/6677/

Trust: 0.1

url:http://secunia.com/advisories/18057/

Trust: 0.1

url:http://secunia.com/product/6676/

Trust: 0.1

url:http://secunia.com/product/6678/

Trust: 0.1

url:http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1686

Trust: 0.1

url:http://support.avaya.com/japple/css/japple?temp.documentid=280948&temp.productid=107770&temp.bucketid=108025&page=document

Trust: 0.1

url:http://support.avaya.com/japple/css/japple?temp.documentid=280946&temp.productid=107770&temp.bucketid=108025&page=document

Trust: 0.1

url:http://support.avaya.com/japple/css/japple?temp.documentid=280939&temp.productid=107770&temp.bucketid=108025&page=document

Trust: 0.1

url:http://secunia.com/product/6524/

Trust: 0.1

url:http://secunia.com/product/6526/

Trust: 0.1

url:http://secunia.com/product/6525/

Trust: 0.1

sources: VULHUB: VHN-14462 // PACKETSTORM: 42570 // PACKETSTORM: 42357 // CNNVD: CNNVD-200512-341 // NVD: CVE-2005-3253

CREDITS

Urmas KaharTarmo Kaljumae

Trust: 0.6

sources: CNNVD: CNNVD-200512-341

SOURCES

db:VULHUBid:VHN-14462
db:PACKETSTORMid:42570
db:PACKETSTORMid:42357
db:CNNVDid:CNNVD-200512-341
db:NVDid:CVE-2005-3253

LAST UPDATE DATE

2024-08-14T15:09:45.724000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14462date:2011-03-08T00:00:00
db:CNNVDid:CNNVD-200512-341date:2006-06-09T00:00:00
db:NVDid:CVE-2005-3253date:2011-03-08T02:26:07.437

SOURCES RELEASE DATE

db:VULHUBid:VHN-14462date:2005-12-16T00:00:00
db:PACKETSTORMid:42570date:2005-12-27T19:53:43
db:PACKETSTORMid:42357date:2005-12-16T20:41:53
db:CNNVDid:CNNVD-200512-341date:2005-12-16T00:00:00
db:NVDid:CVE-2005-3253date:2005-12-16T11:03:00