ID CVE-2015-0924
Summary Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
References
Vulnerable Configurations
  • cpe:2.3:h:ceragon:fiberair_ip-10c:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fiberair_ip-10c:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ceragon:fiberair_ip-10e:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fiberair_ip-10e:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ceragon:fiberair_ip-10g:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fiberair_ip-10g:-:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 27-05-2017 - 01:29)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE COMPLETE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:C/A:N
refmap via4
cert-vn VU#936356
Last major update 27-05-2017 - 01:29
Published 17-01-2015 - 11:59
Last modified 27-05-2017 - 01:29
Back to Top