Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-3427 | First vendor Publication | 2005-11-01 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Cisco Management Center (MC) for IPS Sensors (IPS MC) 2.1 can omit port field values while generating the Cisco IOS IPS configuration file, wich can cause some signatures to be disabled and makes it easier for attackers to escape detection. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3427 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
20444 | Cisco IPS Management Center (MC) Configuration Download Signature Failure Cisco Management Center for IPS Sensors (IPS MC) contains a flaw that may allow a remote attacker to bypass intrusion detection. The issue is due to an error in the management center during the generation of the Cisco IOS IPS configuration file that is missing appropriate TCP/UDP port field values, which causes some signatures to be disabled. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:21:46 |
|
2024-11-28 12:07:34 |
|
2021-05-04 12:03:16 |
|
2021-04-22 01:03:34 |
|
2020-05-23 00:16:55 |
|
2017-07-11 12:02:02 |
|
2016-06-28 15:23:27 |
|
2016-04-26 13:54:38 |
|
2013-05-11 11:33:44 |
|