Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:nec:univerge:ix1010:*:*:*:*:*:*:*", "matchCriteriaId": "4A52B82D-F699-4872-BD5F-90042C259349", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix1011:*:*:*:*:*:*:*", "matchCriteriaId": "73FE55F5-B953-4BC1-899F-4F54C133AAC2", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix1020:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4ACA7-04A8-4897-9BA6-A08840E0FECB", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix1050:*:*:*:*:*:*:*", "matchCriteriaId": "F7323D35-0227-426C-88DC-ECE1BFCE170F", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix2003:*:*:*:*:*:*:*", "matchCriteriaId": "7EC021A2-8C11-4961-9EAE-7233BA6CC73B", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix2004:*:*:*:*:*:*:*", "matchCriteriaId": "0228DF8E-A36E-4F57-B102-C7875464078D", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix2010:*:*:*:*:*:*:*", "matchCriteriaId": "479AF857-7720-4FA9-9F86-FA32D9F28783", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix2010:*:bri:*:*:*:*:*", "matchCriteriaId": "41EB3B04-4FB5-4B48-B997-5B343682A21F", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix2010:*:hub:*:*:*:*:*", "matchCriteriaId": "9E13CA8C-6724-48EF-92C0-0CDFC6F7A7A5", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix2015:*:*:*:*:*:*:*", "matchCriteriaId": "4FF54152-1E78-44DB-916C-AF3762A66A53", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix2015:*:sip:*:*:*:*:*", "matchCriteriaId": "F039DD2B-6A58-4572-82B7-6FC7BBD95059", "vulnerable": true}, {"criteria": "cpe:2.3:h:nec:univerge:ix3010:*:*:*:*:*:*:*", "matchCriteriaId": "89F6D127-E615-484E-8888-5B067C3B5DA5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The Internet Key Exchange version 1 (IKEv1) implementation in NEC UNIVERGE IX1000, IX2000, and IX3000 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to."}], "id": "CVE-2005-4465", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2005-12-22T00:03:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/18166"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16027"}, {"source": "cve@mitre.org", "url": "http://www.sw.nec.co.jp/ixseries/ix1k2k/Support/CERT/NISCC273756.html"}, {"source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/3028"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/18166"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16027"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sw.nec.co.jp/ixseries/ix1k2k/Support/CERT/NISCC273756.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/3028"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}