Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/936356 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/936356 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/936356 - Third Party Advisory, US Government Resource |
Information
Published : 2015-01-17 11:59
Updated : 2024-11-21 02:24
NVD link : CVE-2015-0924
Mitre link : CVE-2015-0924
CVE.ORG link : CVE-2015-0924
JSON object : View
Products Affected
ceragon
- fiberair_ip-10e
- fiberair_ip-10c
- fiberair_ip-10g
CWE
CWE-255
Credentials Management Errors