{"vuid":"VU#927630","idnumber":"927630","name":"NetScreen-Security Manager fails to encrypt communications with managed devices","keywords":["NetScreen-Security Manager","clear text"],"overview":"A vulnerability in the NetScreen-Security Manager software could expose sensitive information in cleartext over the network.","clean_desc":"NetScreen Technologies' NetScreen-Security Manager provides centralized management for control of device configuration, network settings and security policies. According to a security advisory released by NetScreen: The default installation of NetScreen-Security Manager does not automatically enable encryption of communications between NetScreen appliances and systems running ScreenOS 5.0 and the Device Server component of the management system. All communications between NetScreen-Security Manager and devices running ScreenOS 5.0 are clear text, allowing interception of configuration data by third parties, unless the fix below is implemented. Sensitive information contained in the configuration data, such as configuration passwords, could be exposed to an attacker.","impact":"Sensitive information being sent between the system running the Security Manager and the managed devices would be exposed in cleartext over the network. An attacker who was able to intercept network traffic between these systems may then be able to use this information to influence malicious configuration changes in the managed devices.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"Workarounds NetScreen's advisory provides the following mitigation steps for this vulnerability: Either of the following options will enable 128-bit AES encryption between NetScreen-Security Manager and devices running ScreenOS 5.0: (1) Add the following line in the devSvr.cfg file located in the /usr/netscreen/DevSvr/var/ folder, then restart DevSvr services: devSvrManager.cryptoKeyLength 128 - -OR- (2) As root, run the script 'addCryptoParam.sh', which is available on the NetScreen-Security Manager downloads page at www.netscreen.com/cso, then restart DevSvr services. NetScreen-Security Manager 2004 Feature Pack 1, available at a later date, will also address this issue.","sysaffected":"","thanks":"Thanks to NetScreen Technologies, Inc. for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.netscreen.com/services/security/alerts/1_19_04_58290.jsp","http://www.secunia.com/advisories/10675/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-21T14:56:14Z","publicdate":"2004-01-19T00:00:00Z","datefirstpublished":"2004-01-22T18:47:18Z","dateupdated":"2004-01-23T16:48:49Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"5.625","cam_scorecurrentwidelyknown":"6.75","cam_scorecurrentwidelyknownexploited":"11.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.625,"vulnote":null}