CVE-2005-3253
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/12/2005
Last modified:
03/04/2025
Description
Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of "12345", which allows remote attackers to bypass authentication.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:avaya:wireless_ap-3:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-3:2.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-4:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-4:2.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-5:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-5:2.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-6:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-6:2.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-7:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:avaya:wireless_ap-8:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:h:proxim:ap-2000:2.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:h:proxim:ap-4000:2.4.12:*:*:*:*:*:*:* | ||
cpe:2.3:h:proxim:ap-4000:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:h:proxim:ap-600:2.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:h:proxim:ap-700:2.4.12:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf
- http://secunia.com/advisories/18047
- http://secunia.com/advisories/18057
- http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf
- http://www.osvdb.org/22091
- http://www.vupen.com/english/advisories/2005/2931
- http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf
- http://secunia.com/advisories/18047
- http://secunia.com/advisories/18057
- http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf
- http://www.osvdb.org/22091
- http://www.vupen.com/english/advisories/2005/2931