Search criteria
3 vulnerabilities found for ap-2000 by proxim
VAR-200512-0658
Vulnerability from variot - Updated: 2025-04-03 22:27Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of "12345", which allows remote attackers to bypass authentication. Both Avaya wireless AP and Proxim wireless AP are very popular wireless access devices.
The problem is caused due to the presence of a static WEP key set to "12345". This can be exploited to bypass the 802.1x authentication process.
Successful exploitation allows access to network resources.
The security issue affects the following products: * Avaya Wireless Access Points AP-3, AP-4, AP-5, and AP-6 (All versions after 2.5 to 2.5.4) * Avaya Wireless Access Points AP-7 and AP-8 (All versions after 2.5 and prior to 3.1)
SOLUTION: Avaya Wireless AP-3: Apply Software Update 2.5.5 for AP3. http://support.avaya.com/japple/css/japple?temp.documentID=280939&temp.productID=107770&temp.bucketID=108025&PAGE=Document
Avaya Wireless AP-4, 5, and 6: Apply Software Update 2.5.5 for AP4, 5, and 6. http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document
Avaya Wireless AP-7: Apply Software Update 3.1 for AP7. http://support.avaya.com/japple/css/japple?temp.documentID=280946&temp.productID=107770&temp.bucketID=108025&PAGE=Document
Avaya Wireless AP-8: Apply Software Update 2.5.5 for AP4, 5, and 6. http://support.avaya.com/japple/css/japple?temp.documentID=280948&temp.productID=107770&temp.bucketID=108025&PAGE=Document
PROVIDED AND/OR DISCOVERED BY: Urmas Kahar and Tarmo Kaljumae
ORIGINAL ADVISORY: http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200512-0658",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wireless ap-7",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5"
},
{
"model": "wireless ap-5",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5"
},
{
"model": "wireless ap-8",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5"
},
{
"model": "wireless ap-6",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5"
},
{
"model": "wireless ap-3",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5.4"
},
{
"model": "wireless ap-6",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5.4"
},
{
"model": "wireless ap-5",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5.4"
},
{
"model": "wireless ap-4",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5"
},
{
"model": "wireless ap-4",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5.4"
},
{
"model": "wireless ap-3",
"scope": "eq",
"trust": 1.6,
"vendor": "avaya",
"version": "2.5"
},
{
"model": "ap-4000",
"scope": "eq",
"trust": 1.0,
"vendor": "proxim",
"version": "3.0"
},
{
"model": "ap-600",
"scope": "eq",
"trust": 1.0,
"vendor": "proxim",
"version": "2.5.4"
},
{
"model": "ap-2000",
"scope": "eq",
"trust": 1.0,
"vendor": "proxim",
"version": "2.5.4"
},
{
"model": "ap-700",
"scope": "eq",
"trust": 1.0,
"vendor": "proxim",
"version": "2.4.12"
},
{
"model": "ap-700",
"scope": "eq",
"trust": 1.0,
"vendor": "proxim",
"version": "3.0"
},
{
"model": "ap-4000",
"scope": "eq",
"trust": 1.0,
"vendor": "proxim",
"version": "2.4.12"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
},
{
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Urmas KaharTarmo Kaljumae",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
}
],
"trust": 0.6
},
"cve": "CVE-2005-3253",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2005-3253",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-14462",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2005-3253",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200512-341",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-14462",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-14462"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
},
{
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of \"12345\", which allows remote attackers to bypass authentication. Both Avaya wireless AP and Proxim wireless AP are very popular wireless access devices. \n\nThe problem is caused due to the presence of a static WEP key set to\n\"12345\". This can be exploited to bypass the 802.1x authentication\nprocess. \n\nSuccessful exploitation allows access to network resources. \n\nThe security issue affects the following products:\n* Avaya Wireless Access Points AP-3, AP-4, AP-5, and AP-6 (All\nversions after 2.5 to 2.5.4)\n* Avaya Wireless Access Points AP-7 and AP-8 (All versions after 2.5\nand prior to 3.1)\n\nSOLUTION:\nAvaya Wireless AP-3:\nApply Software Update 2.5.5 for AP3. \nhttp://support.avaya.com/japple/css/japple?temp.documentID=280939\u0026temp.productID=107770\u0026temp.bucketID=108025\u0026PAGE=Document\n\nAvaya Wireless AP-4, 5, and 6:\nApply Software Update 2.5.5 for AP4, 5, and 6. \nhttp://support.avaya.com/japple/css/japple?temp.documentID=280948\u0026temp.productID=107770\u0026temp.bucketID=108025\u0026PAGE=Document\n\nAvaya Wireless AP-7:\nApply Software Update 3.1 for AP7. \nhttp://support.avaya.com/japple/css/japple?temp.documentID=280946\u0026temp.productID=107770\u0026temp.bucketID=108025\u0026PAGE=Document\n\nAvaya Wireless AP-8:\nApply Software Update 2.5.5 for AP4, 5, and 6. \nhttp://support.avaya.com/japple/css/japple?temp.documentID=280948\u0026temp.productID=107770\u0026temp.bucketID=108025\u0026PAGE=Document\n\nPROVIDED AND/OR DISCOVERED BY:\nUrmas Kahar and Tarmo Kaljumae\n\nORIGINAL ADVISORY:\nhttp://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2005-3253"
},
{
"db": "VULHUB",
"id": "VHN-14462"
},
{
"db": "PACKETSTORM",
"id": "42570"
},
{
"db": "PACKETSTORM",
"id": "42357"
}
],
"trust": 1.17
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "SECUNIA",
"id": "18057",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "18047",
"trust": 1.8
},
{
"db": "NVD",
"id": "CVE-2005-3253",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2005-2931",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "22091",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200512-341",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-14462",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "42570",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "42357",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-14462"
},
{
"db": "PACKETSTORM",
"id": "42570"
},
{
"db": "PACKETSTORM",
"id": "42357"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
},
{
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"id": "VAR-200512-0658",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-14462"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-03T22:27:07.905000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://keygen.proxim.com/support/cs/documents/802.1x_vulnerability.pdf"
},
{
"trust": 1.8,
"url": "http://support.avaya.com/elmodocs2/security/asa-2005-233.pdf"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/22091"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/18047"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/18057"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2005/2931"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2005/2931"
},
{
"trust": 0.2,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.2,
"url": "http://secunia.com/advisories/18047/"
},
{
"trust": 0.2,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.2,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1250"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6679/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6680/"
},
{
"trust": 0.1,
"url": "http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1222"
},
{
"trust": 0.1,
"url": "http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1221"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6681/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6677/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/18057/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6676/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6678/"
},
{
"trust": 0.1,
"url": "http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/std_adp.php?p_faqid=1686"
},
{
"trust": 0.1,
"url": "http://support.avaya.com/japple/css/japple?temp.documentid=280948\u0026temp.productid=107770\u0026temp.bucketid=108025\u0026page=document"
},
{
"trust": 0.1,
"url": "http://support.avaya.com/japple/css/japple?temp.documentid=280946\u0026temp.productid=107770\u0026temp.bucketid=108025\u0026page=document"
},
{
"trust": 0.1,
"url": "http://support.avaya.com/japple/css/japple?temp.documentid=280939\u0026temp.productid=107770\u0026temp.bucketid=108025\u0026page=document"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6524/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6526/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6525/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-14462"
},
{
"db": "PACKETSTORM",
"id": "42570"
},
{
"db": "PACKETSTORM",
"id": "42357"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
},
{
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-14462"
},
{
"db": "PACKETSTORM",
"id": "42570"
},
{
"db": "PACKETSTORM",
"id": "42357"
},
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
},
{
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2005-12-16T00:00:00",
"db": "VULHUB",
"id": "VHN-14462"
},
{
"date": "2005-12-27T19:53:43",
"db": "PACKETSTORM",
"id": "42570"
},
{
"date": "2005-12-16T20:41:53",
"db": "PACKETSTORM",
"id": "42357"
},
{
"date": "2005-12-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200512-341"
},
{
"date": "2005-12-16T11:03:00",
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-03-08T00:00:00",
"db": "VULHUB",
"id": "VHN-14462"
},
{
"date": "2006-06-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200512-341"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2005-3253"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WEP Key Authentication Bypass Vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "unknown",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200512-341"
}
],
"trust": 0.6
}
}
CVE-2005-3253 (GCVE-0-2005-3253)
Vulnerability from nvd – Published: 2005-12-16 11:00 – Updated: 2024-08-07 23:01- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:01:59.253Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22091"
},
{
"name": "18047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18047"
},
{
"name": "18057",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18057"
},
{
"name": "ADV-2005-2931",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2931"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of \"12345\", which allows remote attackers to bypass authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-01-20T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22091"
},
{
"name": "18047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18047"
},
{
"name": "18057",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18057"
},
{
"name": "ADV-2005-2931",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2931"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3253",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of \"12345\", which allows remote attackers to bypass authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22091",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22091"
},
{
"name": "18047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18047"
},
{
"name": "18057",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18057"
},
{
"name": "ADV-2005-2931",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2931"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf"
},
{
"name": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf",
"refsource": "CONFIRM",
"url": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3253",
"datePublished": "2005-12-16T11:00:00",
"dateReserved": "2005-10-18T00:00:00",
"dateUpdated": "2024-08-07T23:01:59.253Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-3253 (GCVE-0-2005-3253)
Vulnerability from cvelistv5 – Published: 2005-12-16 11:00 – Updated: 2024-08-07 23:01- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:01:59.253Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22091"
},
{
"name": "18047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18047"
},
{
"name": "18057",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18057"
},
{
"name": "ADV-2005-2931",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2005/2931"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of \"12345\", which allows remote attackers to bypass authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-01-20T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22091"
},
{
"name": "18047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18047"
},
{
"name": "18057",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18057"
},
{
"name": "ADV-2005-2931",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2005/2931"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-3253",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of \"12345\", which allows remote attackers to bypass authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22091",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22091"
},
{
"name": "18047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18047"
},
{
"name": "18057",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18057"
},
{
"name": "ADV-2005-2931",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2931"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf"
},
{
"name": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf",
"refsource": "CONFIRM",
"url": "http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-3253",
"datePublished": "2005-12-16T11:00:00",
"dateReserved": "2005-10-18T00:00:00",
"dateUpdated": "2024-08-07T23:01:59.253Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}