ID

VAR-200608-0340


CVE

CVE-2006-4313


TITLE

Cisco VPN 3000 For changing files in the Series Concentrator CWD Command execution vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2006-001117

DESCRIPTION

Multiple unspecified vulnerabilities in Cisco VPN 3000 series concentrators before 4.1, 4.1.x up to 4.1(7)L, and 4.7.x up to 4.7(2)F allow attackers to execute the (1) CWD, (2) MKD, (3) CDUP, (4) RNFR, (5) SIZE, and (6) RMD FTP commands to modify files or create and delete directories via unknown vectors. The Cisco VPN 3000 series concentrators are prone to a vulnerability that allows attackers to access arbitrary files. An attacker can exploit this issue to rename and delete arbitrary files on the affected device in the context of the FTP server process. This may facilitate further attacks. The Cisco VPN Series Concentrators consist of a general-purpose remote-access virtual private network (VPN) platform and client software that combines high availability, performance, and scalability with today's most advanced encryption and authentication technologies for professional operations Provide services to merchants or enterprise users. * Change the configuration of the hub by renaming or deleting configuration and certificate files through RNFR and RMD FTP commands. Please note that since none of these vulnerabilities allow unauthorized users to upload or download files from the hub, it is not possible to obtain device configurations or upload modified configurations by exploiting these vulnerabilities. ---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Cisco VPN 3000 Concentrator FTP Management Vulnerabilities SECUNIA ADVISORY ID: SA21617 VERIFY ADVISORY: http://secunia.com/advisories/21617/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From local network OPERATING SYSTEM: Cisco VPN 3000 Concentrator http://secunia.com/product/90/ DESCRIPTION: Two vulnerabilities have been reported in Cisco VPN 3000 Concentrator, which can be exploited by malicious people to bypass certain security restrictions. This can e.g. be exploited to delete configuration files and certificates on the device. Successful exploitation requires that the device has been configured to use FTP as a management protocol (default setting). The vulnerabilities affect models 3005, 3015, 3020, 3030, 3060, and 3080 running the following versions: * Any version prior to 4.1 * Any 4.1.x version prior to, and including, 4.1(7)L * Any 4.7.x version prior to, and including, 4.7(2)F SOLUTION: Update to version 4.1(7)M or 4.7(2)G. http://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des?psrtdcat20e2 Network security best practises recommend restricting access to the FTP service (or disabling it if not needed to manage the VPN 3000 concentrator). PROVIDED AND/OR DISCOVERED BY: The vendor credits NCC Group. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-4313 // JVNDB: JVNDB-2006-001117 // BID: 19680 // VULHUB: VHN-20421 // PACKETSTORM: 49189

AFFECTED PRODUCTS

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.5.2

Trust: 1.5

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.1.7.a

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.7

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.1.5.b

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.7.1.f

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.1.7.b

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.7.2.f

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.7.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.0.5.b

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.0.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.1.7.l

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentratorscope:ltversion:4.1

Trust: 0.8

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.1(7)l for up to 4.1.x

Trust: 0.8

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:and 4.7(2)f for up to 4.7.x

Trust: 0.8

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.3

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.1.7.a

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.1.7.b

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.1.5.b

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.0.5.b

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.1.7.l

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.0

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.0.1

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.7.1

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.7.1.f

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:4.7

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.3

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.x

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.4

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30304.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.ascope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30304.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.4

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:neversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30604.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30804.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:neversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.0.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:neversion:30304.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30204.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30804.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30603.5.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.0.5

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3060

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3020

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30154.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30804.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.1.x

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30604.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30054.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30204.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30304.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30804.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3030

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30204.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30154.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.1.5

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30604.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:neversion:30004.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:neversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:neversion:30204.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.bscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:neversion:30804.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30604.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30804.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:neversion:30804.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:neversion:30604.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator bscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3080

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30804.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30010

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30054.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30604.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30204.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30154.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30054.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30604.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator dscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:neversion:30154.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30804.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.3

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30054.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30204.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30204.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:neversion:30054.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3015

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator relscope:eqversion:30154.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator lscope:eqversion:30154.1.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:neversion:30604.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator gscope:neversion:30154.7.2

Trust: 0.3

vendor:ciscomodel:vpn concentrator cscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.0.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator dscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.5

Trust: 0.3

vendor:ciscomodel:vpn concentrator mscope:neversion:30004.1.7

Trust: 0.3

sources: BID: 19680 // JVNDB: JVNDB-2006-001117 // CNNVD: CNNVD-200608-390 // NVD: CVE-2006-4313

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4313
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-4313
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200608-390
value: MEDIUM

Trust: 0.6

VULHUB: VHN-20421
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-4313
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-20421
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-20421 // JVNDB: JVNDB-2006-001117 // CNNVD: CNNVD-200608-390 // NVD: CVE-2006-4313

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-4313

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200608-390

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200608-390

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001117

PATCH

title:cisco-sa-20060823-vpn3kurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20060823-vpn3k

Trust: 0.8

sources: JVNDB: JVNDB-2006-001117

EXTERNAL IDS

db:NVDid:CVE-2006-4313

Trust: 2.8

db:BIDid:19680

Trust: 2.0

db:SECUNIAid:21617

Trust: 1.8

db:SECTRACKid:1016737

Trust: 1.7

db:OSVDBid:28138

Trust: 1.7

db:OSVDBid:28139

Trust: 1.7

db:VUPENid:ADV-2006-3368

Trust: 1.7

db:JVNDBid:JVNDB-2006-001117

Trust: 0.8

db:CNNVDid:CNNVD-200608-390

Trust: 0.7

db:CISCOid:20060823 CISCO VPN 3000 CONCENTRATOR FTP MANAGEMENT VULNERABILITIES

Trust: 0.6

db:XFid:28539

Trust: 0.6

db:VULHUBid:VHN-20421

Trust: 0.1

db:PACKETSTORMid:49189

Trust: 0.1

sources: VULHUB: VHN-20421 // BID: 19680 // JVNDB: JVNDB-2006-001117 // PACKETSTORM: 49189 // CNNVD: CNNVD-200608-390 // NVD: CVE-2006-4313

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml

Trust: 1.8

url:http://www.securityfocus.com/bid/19680

Trust: 1.7

url:http://www.osvdb.org/28138

Trust: 1.7

url:http://www.osvdb.org/28139

Trust: 1.7

url:http://securitytracker.com/id?1016737

Trust: 1.7

url:http://secunia.com/advisories/21617

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/3368

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28539

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4313

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4313

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/28539

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3368

Trust: 0.6

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080718330.shtml

Trust: 0.3

url:http://secunia.com/advisories/21617/

Trust: 0.1

url:http://secunia.com/product/90/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des?psrtdcat20e2

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-20421 // BID: 19680 // JVNDB: JVNDB-2006-001117 // PACKETSTORM: 49189 // CNNVD: CNNVD-200608-390 // NVD: CVE-2006-4313

CREDITS

NCC Group

Trust: 0.6

sources: CNNVD: CNNVD-200608-390

SOURCES

db:VULHUBid:VHN-20421
db:BIDid:19680
db:JVNDBid:JVNDB-2006-001117
db:PACKETSTORMid:49189
db:CNNVDid:CNNVD-200608-390
db:NVDid:CVE-2006-4313

LAST UPDATE DATE

2024-08-14T15:31:01.800000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-20421date:2018-10-30T00:00:00
db:BIDid:19680date:2009-07-08T20:06:00
db:JVNDBid:JVNDB-2006-001117date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200608-390date:2006-08-24T00:00:00
db:NVDid:CVE-2006-4313date:2018-10-30T16:26:19.327

SOURCES RELEASE DATE

db:VULHUBid:VHN-20421date:2006-08-23T00:00:00
db:BIDid:19680date:2006-08-23T00:00:00
db:JVNDBid:JVNDB-2006-001117date:2012-06-26T00:00:00
db:PACKETSTORMid:49189date:2006-08-27T00:18:48
db:CNNVDid:CNNVD-200608-390date:2006-08-23T00:00:00
db:NVDid:CVE-2006-4313date:2006-08-23T22:04:00