ID

VAR-200701-0592


CVE

CVE-2007-0058


TITLE

CAM of CCA Arbitrary manual database backup download vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-001324

DESCRIPTION

Cisco Clean Access (CCA) 3.5.x through 3.5.9 and 3.6.x through 3.6.1.1 on the Clean Access Manager (CAM) allows remote attackers to bypass authentication and download arbitrary manual database backups by guessing the snapshot filename using brute force, then making a direct request for the file. Cisco Clean Access (CCA) is prone to a security bypass vulnerability. Cisco Clean Access (CCA) is a software solution for automatically detecting, quarantining, and cleaning devices infected with malicious code from accessing the network. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco Clean Access Predictable Snapshots Filename SECUNIA ADVISORY ID: SA23556 VERIFY ADVISORY: http://secunia.com/advisories/23556/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information WHERE: >From local network SOFTWARE: Cisco Clean Access (CCA) 3.x http://secunia.com/product/5561/ DESCRIPTION: Cisco has acknowledged a security issue in Cisco Clean Access, which can be exploited by malicious people to gain knowledge of sensitive information. The security issue is caused due to the use of a predictable method to name manual backups of the database, which can be exploited to disclose the contents of the database. The security issue is reported in CCA releases 3.5.x - 3.5.9 and 3.6.x - 3.6.1.1. Other versions may also be affected. SOLUTION: Update to versions 3.5.10 or 3.6.2. PROVIDED AND/OR DISCOVERED BY: The vendor credits Chris Hartley from Ohio State University. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00807b6621.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-0058 // JVNDB: JVNDB-2007-001324 // BID: 86819 // VULHUB: VHN-23420 // PACKETSTORM: 53425

AFFECTED PRODUCTS

vendor:ciscomodel:network admission control manager and server system softwarescope:gteversion:3.6.0.0

Trust: 1.0

vendor:ciscomodel:network admission control manager and server system softwarescope:lteversion:3.5.9

Trust: 1.0

vendor:ciscomodel:network admission control manager and server system softwarescope:gteversion:3.5.0

Trust: 1.0

vendor:ciscomodel:network admission control manager and server system softwarescope:lteversion:3.6.1.1

Trust: 1.0

vendor:ciscomodel:clean accessscope:eqversion:3.5.9

Trust: 0.9

vendor:ciscomodel:clean accessscope:eqversion:3.5.x to 3.5.9 and 3.6.x to 3.6.1.1

Trust: 0.8

vendor:ciscomodel:clean accessscope:eqversion:3.5.1

Trust: 0.6

vendor:ciscomodel:clean accessscope:eqversion:3.5.2

Trust: 0.6

vendor:ciscomodel:network admission control manager and server system softwarescope:eqversion:3.5.5

Trust: 0.6

vendor:ciscomodel:network admission control manager and server system softwarescope:eqversion:3.5.9

Trust: 0.6

vendor:ciscomodel:clean accessscope:eqversion:3.5.4

Trust: 0.6

vendor:ciscomodel:clean accessscope:eqversion:3.6.1.1

Trust: 0.6

vendor:ciscomodel:clean accessscope:eqversion:3.5.5

Trust: 0.6

vendor:ciscomodel:clean accessscope:eqversion:3.5.3

Trust: 0.6

vendor:ciscomodel:clean accessscope:eqversion:3.6.0.1

Trust: 0.6

vendor:ciscomodel:clean accessscope:eqversion:3.6.11

Trust: 0.3

sources: BID: 86819 // JVNDB: JVNDB-2007-001324 // CNNVD: CNNVD-200701-017 // NVD: CVE-2007-0058

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0058
value: HIGH

Trust: 1.0

NVD: CVE-2007-0058
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200701-017
value: HIGH

Trust: 0.6

VULHUB: VHN-23420
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0058
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23420
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23420 // JVNDB: JVNDB-2007-001324 // CNNVD: CNNVD-200701-017 // NVD: CVE-2007-0058

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-23420 // NVD: CVE-2007-0058

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200701-017

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200701-017

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001324

PATCH

title:cisco-sa-20070103-CleanAccessurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20070103-CleanAccess

Trust: 0.8

sources: JVNDB: JVNDB-2007-001324

EXTERNAL IDS

db:NVDid:CVE-2007-0058

Trust: 2.8

db:SECTRACKid:1017465

Trust: 2.0

db:SECUNIAid:23556

Trust: 1.8

db:OSVDBid:32579

Trust: 1.7

db:VUPENid:ADV-2007-0030

Trust: 1.7

db:JVNDBid:JVNDB-2007-001324

Trust: 0.8

db:CNNVDid:CNNVD-200701-017

Trust: 0.7

db:CISCOid:20070103 MULTIPLE VULNERABILITIES IN CISCO CLEAN ACCESS

Trust: 0.6

db:BIDid:86819

Trust: 0.4

db:VULHUBid:VHN-23420

Trust: 0.1

db:PACKETSTORMid:53425

Trust: 0.1

sources: VULHUB: VHN-23420 // BID: 86819 // JVNDB: JVNDB-2007-001324 // PACKETSTORM: 53425 // CNNVD: CNNVD-200701-017 // NVD: CVE-2007-0058

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20070103-cleanaccess.shtml

Trust: 2.0

url:http://securitytracker.com/id?1017465

Trust: 2.0

url:http://www.osvdb.org/32579

Trust: 1.7

url:http://secunia.com/advisories/23556

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/0030

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0058

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0058

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/0030

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807b6621.shtml

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/product/5561/

Trust: 0.1

url:http://secunia.com/advisories/23556/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-23420 // BID: 86819 // JVNDB: JVNDB-2007-001324 // PACKETSTORM: 53425 // CNNVD: CNNVD-200701-017 // NVD: CVE-2007-0058

CREDITS

Unknown

Trust: 0.3

sources: BID: 86819

SOURCES

db:VULHUBid:VHN-23420
db:BIDid:86819
db:JVNDBid:JVNDB-2007-001324
db:PACKETSTORMid:53425
db:CNNVDid:CNNVD-200701-017
db:NVDid:CVE-2007-0058

LAST UPDATE DATE

2025-04-10T23:18:16.174000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23420date:2018-10-30T00:00:00
db:BIDid:86819date:2007-01-04T00:00:00
db:JVNDBid:JVNDB-2007-001324date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200701-017date:2007-07-05T00:00:00
db:NVDid:CVE-2007-0058date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-23420date:2007-01-04T00:00:00
db:BIDid:86819date:2007-01-04T00:00:00
db:JVNDBid:JVNDB-2007-001324date:2012-06-26T00:00:00
db:PACKETSTORMid:53425date:2007-01-04T17:16:54
db:CNNVDid:CNNVD-200701-017date:2007-01-04T00:00:00
db:NVDid:CVE-2007-0058date:2007-01-04T22:28:00