Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0066.html | Broken Link |
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0075.html | Broken Link |
http://www.iss.net/security_center/static/9810.php | Broken Link |
http://www.securityfocus.com/bid/5436 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2002-08-12 04:00
Updated : 2024-02-28 10:24
NVD link : CVE-2002-0812
Mitre link : CVE-2002-0812
CVE.ORG link : CVE-2002-0812
JSON object : View
Products Affected
hpe
- compaq_wl310_firmware
- compaq_wl310
proxim
- orinoco_rg-1100_firmware
- orinoco_rg-1000_firmware
- orinoco_rg-1100
- orinoco_rg-1000
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor