ID

VAR-200308-0077


CVE

CVE-2003-0512


TITLE

Cisco Aironet AP1100 fails to provide universal login error messages thereby disclosing validity of user account

Trust: 0.8

sources: CERT/CC: VU#886796

DESCRIPTION

Cisco IOS 12.2 and earlier generates a "% Login invalid" message instead of prompting for a password when an invalid username is provided, which allows remote attackers to identify valid usernames on the system and conduct brute force password guessing, as reported for the Aironet Bridge. A vulnerability in the Cisco Aironet 1100 Series Access Point may allow a remote attacker to discover valid accounts on the access point. Cisco IOS Specific versions of telnet There is a vulnerability that the response of the authentication result varies depending on the user name when password authentication is performed via.Depending on the response, it may be possible to infer whether the user exists. An information leak has been reported in Cisco Aironet Access Points when the telnet service has been enabled. This may allow a remote attacker to gain potentially sensitive information. If it is illegal, it will prompt the \"\\% Login invalid\" message. VIGILANTe Security Watch Advisory Name: Cisco Aironet AP1100 Valid Account Disclosure Vulnerability Systems Affected: Tested on a Cisco Aironet AP1100 Model 1120B Series Wireless device. Firmware version 12.2(4)JA and earlier. NB : A large number of Cisco IOSes are affected by this flaw. Severity: High Risk Vendor URL: http://www.vigilante.com Authors: Reda Zitouni (reda.zitouni@vigilante.com) Date: 28th July 2003 Advisory Code: VIGILANTE-2003002 Description *********** Cisco Aironet 1100 Series Access Point is a device manufactured by Cisco Systems offering a WLAN solution based on the 802.11b Wifi standard. The Aironet Bridge is vulnerable to a Brute Force attack revealing if an account exists or not. If an attacker submits an existing account as login he will be then prompted for the password. If not the case a ""% Login invalid" reply will be displayed by the server, revealing the account is not existing. By default on the Aironet AP1100, the 'cisco' account is set and is prompted for a password when submitted. That default account then allows an attacker to determine if this flaw on the remote device is patched or not. This may lead to further serious attacks. Vendor status: ************** Cisco was contacted June 19, 2003 and answered the same day. 5 days later, they told us that they would release a patch soon. The patch was finally released July 3, 2003. Please note that this flaw is released by Cisco as a Security Notice in CCO. Vulnerability Assessment: ************************ A test case to detect this vulnerability was added to SecureScan NX in the upgrade package of July 28, 2003. You can see the documentation of this test case 15438 on SecureScan NX web site at http://securescannx.vigilante.com/tc/15438. Fix: A firmware upgrading the Aironet IOS version to c1100-k9w7 has been released by Cisco. Please note that this version fixes some other bugs as TC 17655 (refer to release note). A stronger authentication mechanism, such as SSH can also be implemented. CVE: Common Vulnerabilities and Exposures group ( reachable at http://cve.mitre.org/ ) was contacted and assigned CAN-2003-0512 to this vulnerability. Links: ***** Cisco Advisory: http://www.cisco.com/warp/public/707/cisco-sn-20030724-ios-enum.shtml Vigilante Advisory: http://www.vigilante.com/inetsecurity/advisories/VIGILANTE-2003002.htm Product Homepage: http://www.cisco.com/warp/public/cc/pd/witc/ps4570 CVE: CAN-2003-0512 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CAN-2003-0512 Credit: ****** This vulnerability was discovered by Reda Zitouni, member of our Security Watch Team at VIGILANTe. We wish to thank Cisco PSIRT Team for their fast answer to fix this problem. Copyright VIGILANTe.com, Inc. 2003-07-28 Disclaimer: ********** The information within this document may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any consequences whatsoever arising out of or in connection with the use or spread of this information. Any use of this information lays within the user's responsibility. Feedback: ******** Please send suggestions, updates, and comments to securitywatch@vigilante.com

Trust: 2.79

sources: NVD: CVE-2003-0512 // CERT/CC: VU#886796 // JVNDB: JVNDB-2003-000233 // BID: 8292 // VULHUB: VHN-7340 // PACKETSTORM: 31464

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.0\(24\)s1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(11\)ja1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(16.1\)b

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(16\)b

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(14.5\)

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(15.1\)s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(15\)zn

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0\(24.2\)s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2\(14.5\)t

Trust: 1.6

vendor:ciscomodel:ios 12.2 jascope: - version: -

Trust: 0.9

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.3

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:ios 12.2 ja1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 bscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 znscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2(14.5)

Trust: 0.3

vendor:ciscomodel:ios 12.0 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 s1scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#886796 // BID: 8292 // JVNDB: JVNDB-2003-000233 // CNNVD: CNNVD-200308-156 // NVD: CVE-2003-0512

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2003-0512
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#886796
value: 4.80

Trust: 0.8

NVD: CVE-2003-0512
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200308-156
value: MEDIUM

Trust: 0.6

VULHUB: VHN-7340
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2003-0512
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-7340
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#886796 // VULHUB: VHN-7340 // JVNDB: JVNDB-2003-000233 // CNNVD: CNNVD-200308-156 // NVD: CVE-2003-0512

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-7340 // JVNDB: JVNDB-2003-000233 // NVD: CVE-2003-0512

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 31464 // CNNVD: CNNVD-200308-156

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-200308-156

CONFIGURATIONS

sources: JVNDB: JVNDB-2003-000233

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-7340

PATCH

title:cisco-sn-20030724-ios-enumurl:http://www.cisco.com/warp/public/707/cisco-sn-20030724-ios-enum.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2003-000233

EXTERNAL IDS

db:CERT/CCid:VU#886796

Trust: 3.3

db:NVDid:CVE-2003-0512

Trust: 2.9

db:BIDid:8292

Trust: 1.2

db:JVNDBid:JVNDB-2003-000233

Trust: 0.8

db:CNNVDid:CNNVD-200308-156

Trust: 0.7

db:CISCOid:20030724 ENUMERATING LOCALLY DEFINED USERS IN CISCO IOS

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5824

Trust: 0.6

db:VULNWATCHid:20030728 CISCO AIRONET AP1100 VALID ACCOUNT DISCLOSURE VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:31464

Trust: 0.2

db:VULHUBid:VHN-7340

Trust: 0.1

sources: CERT/CC: VU#886796 // VULHUB: VHN-7340 // BID: 8292 // JVNDB: JVNDB-2003-000233 // PACKETSTORM: 31464 // CNNVD: CNNVD-200308-156 // NVD: CVE-2003-0512

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sn-20030724-ios-enum.shtml

Trust: 2.9

url:http://www.vigilante.com/inetsecurity/advisories/vigilante-2003002.htm

Trust: 2.6

url:http://www.kb.cert.org/vuls/id/886796

Trust: 2.5

url:http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0056.html

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5824

Trust: 1.1

url:http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fsaaa/index.htm

Trust: 0.8

url:http://www.cisco.com/pcgi-bin/support/bugtool/onebug.pl?bugid=cscdz29724

Trust: 0.8

url:http://www.cisco.com/warp/public/cc/pd/witc/ps4570/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0512

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0512

Trust: 0.8

url:http://www.securityfocus.com/bid/8292

Trust: 0.8

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5824

Trust: 0.6

url:/archive/1/330686

Trust: 0.3

url:http://www.cisco.com/warp/public/cc/pd/witc/ps4570

Trust: 0.1

url:http://www.vigilante.com

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-can-2003-0512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2003-0512

Trust: 0.1

url:http://cve.mitre.org/

Trust: 0.1

url:http://securescannx.vigilante.com/tc/15438.

Trust: 0.1

sources: CERT/CC: VU#886796 // VULHUB: VHN-7340 // BID: 8292 // JVNDB: JVNDB-2003-000233 // PACKETSTORM: 31464 // CNNVD: CNNVD-200308-156 // NVD: CVE-2003-0512

CREDITS

Reda Zitouni※ reda.zitouni@vigilante.com

Trust: 0.6

sources: CNNVD: CNNVD-200308-156

SOURCES

db:CERT/CCid:VU#886796
db:VULHUBid:VHN-7340
db:BIDid:8292
db:JVNDBid:JVNDB-2003-000233
db:PACKETSTORMid:31464
db:CNNVDid:CNNVD-200308-156
db:NVDid:CVE-2003-0512

LAST UPDATE DATE

2025-04-03T22:27:20.448000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#886796date:2003-07-29T00:00:00
db:VULHUBid:VHN-7340date:2017-10-11T00:00:00
db:BIDid:8292date:2009-07-11T22:56:00
db:JVNDBid:JVNDB-2003-000233date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200308-156date:2009-03-04T00:00:00
db:NVDid:CVE-2003-0512date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#886796date:2003-07-28T00:00:00
db:VULHUBid:VHN-7340date:2003-08-27T00:00:00
db:BIDid:8292date:2003-07-28T00:00:00
db:JVNDBid:JVNDB-2003-000233date:2007-04-01T00:00:00
db:PACKETSTORMid:31464date:2003-07-29T17:47:52
db:CNNVDid:CNNVD-200308-156date:2003-07-28T00:00:00
db:NVDid:CVE-2003-0512date:2003-08-27T04:00:00