{"vuid":"VU#635721","idnumber":"635721","name":"Secure Elements Class 5 AVR client fails to properly validate a messages target CEID","keywords":["Secure Elements","arbitrary code execution","CEID","class 5 evm","c5 evm"],"overview":"The Secure Elements Class 5 AVR client fails to properly validate a message's target CEID. This makes attacks easier, as the attacker does not need to guess the victim's true CEID.","clean_desc":"Class 5 AVR Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components. Class 5 AVR client The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server. Class 5 AVR server The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history. The problem The Class 5 AVR client does not validate the CEID of a message it receives.","impact":"An attacker does not need to guess the true CEID of a victim asset.","resolution":"Upgrade or patch\nThis issue has been resolved in C5 EVM 2.8.1.","workarounds":"","sysaffected":"","thanks":"Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","e","-","e","l","e","m","e","n","t","s",".","c","o","m","/","p","r","o","d","u","c","t","s","/","i","n","d","e","x",".","h","t","m"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-02T20:18:47Z","publicdate":"2006-05-30T00:00:00Z","datefirstpublished":"2006-05-30T20:34:34Z","dateupdated":"2006-06-07T02:49:41Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"2","cam_impact":"7","cam_easeofexploitation":"7","cam_attackeraccessrequired":"15","cam_scorecurrent":"0.3031875","cam_scorecurrentwidelyknown":"0.826875","cam_scorecurrentwidelyknownexploited":"1.378125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.3031875,"vulnote":null}