{"vuid":"VU#921017","idnumber":"921017","name":"Secure Elements Class 5 AVR client sends messages in cleartext","keywords":["Secure Elements","information disclosure","cleartext messages","class 5 EVM","c5 evm"],"overview":"The Secure Elements Class 5 AVR client sends messages in cleartext. This may allow an attacker to read traffic from an asset.","clean_desc":"Class 5 AVR Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components. Class 5 AVR client The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server. Class 5 AVR server The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history. The problem The Class 5 AVR server does not require that incoming messages be encrypted. If an incoming message is in plain text, the server will respond in plain text as well.","impact":"An attacker may be able to read sensitive information that is transmitted between the Class 5 AVR server and client.","resolution":"Upgrade or patch\nThis issue has been resolved in C5 EVM 2.8.1.","workarounds":"","sysaffected":"","thanks":"Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","e","-","e","l","e","m","e","n","t","s",".","c","o","m","/","p","r","o","d","u","c","t","s","/","i","n","d","e","x",".","h","t","m"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-02T20:18:44Z","publicdate":"2006-05-30T00:00:00Z","datefirstpublished":"2006-05-30T20:37:32Z","dateupdated":"2006-06-07T02:55:21Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"2","cam_impact":"8","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.66","cam_scorecurrentwidelyknown":"1.8","cam_scorecurrentwidelyknownexploited":"3","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.66,"vulnote":null}