CVE-2000-0762

Current Description

The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.

Basic Data

PublishedOctober 20, 2000
Last ModifiedOctober 10, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCaEtrust Access Control4.1*******
    2.3ApplicationCaEtrust Access Control4.1sp1******
    2.3ApplicationCaEtrust Access Control5.0*******
    2.3ApplicationCaEtrust Access Control5.0sp1******

Vulnerable Software List

VendorProductVersions
Ca Etrust Access Control 4.1, 5.0

References

NameSourceURLTags
http://support.ca.com/techbases/eTrust/etrust_access_control-response.htmlhttp://support.ca.com/techbases/eTrust/etrust_access_control-response.htmlCONFIRM
1517http://www.osvdb.org/1517OSVDB
1583http://www.securityfocus.com/bid/1583BIDPatch Vendor Advisory
20000811 eTrust Access Control - Root compromise for default installhttp://www.securityfocus.com/templates/archive.pike?list=1&msg=004601c003a1$ba473260$ddeaa2cd@itradeBUGTRAQPatch Vendor Advisory
etrust-access-control-default(5076)https://exchange.xforce.ibmcloud.com/vulnerabilities/5076XF