{"vuid":"VU#498553","idnumber":"498553","name":"EMC NetWorker Management Console weak authentication vulnerability","keywords":["Legato","Networker Management Console","NMC","arbitrary code execution"],"overview":"A vulnerability in the authentication mechanism used by the Legato NetWorker Management Console may allow an attacker to execute arbitrary commands.","clean_desc":"The EMC NetWorker (formerly Legato NetWorker) family of products provides solutions for backup and recovery of data. It includes the EMC NetWorker Management Console option which provides a Java-based interface for monitoring, administration, and reporting for NetWorker environments. The NetWorker Management Console configures and uses a weak form of authentication to connect to managed NetWorker backup servers. Any remote attacker with knowledge of this authentication mechanism could impersonate the NetWorker Management Console system and connect to the affected servers with root privileges.","impact":"A remote attacker may be able to execute arbitrary commands on a vulnerable system. The attacker-supplied commands would be executed with root privileges. Secondary impacts include, but are not limited to, compromise of backup archive integrity.","resolution":"Apply an update EMC has published patches to address this issue. Please see the Systems Affected section of this document for additional details.","workarounds":"Restrict access to the affected component Users, particularly those who are unable to apply the patches, are encouraged to block access to ports 2638/tcp and 2638/udp at the network perimeter and on the host running the EMC NetWorker Management Console.","sysaffected":"","thanks":"Thanks to \nthe National Oceanic and Atmospheric Administration (NOAA) Computer Incident Response Team (N-CIRT) Lab for reporting this issue.","author":"This document was written by Chad R Dougherty.","public":["ftp://ftp.legato.com/pub/NetWorker/Updates/732JumboUpdate1/README%20732%20Jumbo%20Update%201.txt","http://secunia.com/advisories/24362/","http://www.auscert.org.au/7358","http://www.securityfocus.com/bid/22789","http://securitytracker.com/id?1017724"],"cveids":["CVE-2006-3892"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-14T14:57:01Z","publicdate":"2007-02-26T00:00:00Z","datefirstpublished":"2007-03-02T16:26:08Z","dateupdated":"2007-03-19T18:49:21Z","revision":16,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"9","cam_impact":"19","cam_easeofexploitation":"18","cam_attackeraccessrequired":"15","cam_scorecurrent":"19.9108125","cam_scorecurrentwidelyknown":"25.970625","cam_scorecurrentwidelyknownexploited":"43.284375","ipprotocol":"tcp\n2638/udp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":19.9108125,"vulnote":null}