ID CVE-2006-3287
Summary Cisco Wireless Control System (WCS) for Linux and Windows 4.0(1) and earlier uses a default administrator username "root" and password "public," which allows remote attackers to gain access (aka bug CSCse21391).
References
Vulnerable Configurations
  • cpe:2.3:h:cisco:wireless_control_system:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:wireless_control_system:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:wireless_control_system:3.2\(40\):*:*:*:*:*:*:*
    cpe:2.3:h:cisco:wireless_control_system:3.2\(40\):*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:wireless_control_system:3.2\(51\):*:*:*:*:*:*:*
    cpe:2.3:h:cisco:wireless_control_system:3.2\(51\):*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:wireless_control_system:4.0:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:wireless_control_system:4.0:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:wireless_control_system:4.0\(1\):*:*:*:*:*:*:*
    cpe:2.3:h:cisco:wireless_control_system:4.0\(1\):*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 20-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 18701
cisco 20060628 Multiple Vulnerabilities in Wireless Control System
osvdb 26882
sectrack 1016398
secunia 20870
vupen ADV-2006-2583
xf cisco-wcs-default-admin-account(27439)
Last major update 20-07-2017 - 01:32
Published 28-06-2006 - 23:05
Last modified 20-07-2017 - 01:32
Back to Top