{"vuid":"VU#566553","idnumber":"566553","name":"Secure Elements Class 5 AVR uses the same RSA key for all installations","keywords":["Secure Elements","information disclosure","RSA key","class 5 EVM","c5 evm"],"overview":"Secure Elements Class 5 AVR uses the same RSA key for all installations. This may allow a remote attacker to decrypt communications between systems.","clean_desc":"Class 5 AVR Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components. Class 5 AVR client The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server. Class 5 AVR server The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history. The problem Class 5 AVR client uses the same RSA key for all installations.","impact":"A remote attacker may be able to decrypt communications between Class 5 AVR systems.","resolution":"Upgrade or patch\nThis issue has been resolved in C5 EVM 2.8.1.","workarounds":"","sysaffected":"","thanks":"Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","e","-","e","l","e","m","e","n","t","s",".","c","o","m","/","p","r","o","d","u","c","t","s","/","i","n","d","e","x",".","h","t","m"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-02T21:08:38Z","publicdate":"2006-05-30T00:00:00Z","datefirstpublished":"2006-05-30T20:43:02Z","dateupdated":"2006-06-07T03:03:44Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"0.9","cam_scorecurrentwidelyknown":"6.6","cam_scorecurrentwidelyknownexploited":"12.6","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.9,"vulnote":null}