The firmware in MNS before 4.5.6 on Belden GarrettCom Magnum 6K and Magnum 10K switches has a hardcoded serial-console password for a privileged account, which might allow physically proximate attackers to obtain access by establishing a console session to a nonstandard installation on which this account is enabled, and leveraging knowledge of this password.
References
Link | Resource |
---|---|
http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdf | Vendor Advisory |
http://www.securityfocus.com/bid/75235 | |
https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01 | Third Party Advisory US Government Resource |
http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdf | Vendor Advisory |
http://www.securityfocus.com/bid/75235 | |
https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdf - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/75235 - | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01 - Third Party Advisory, US Government Resource |
Information
Published : 2015-08-04 01:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-3959
Mitre link : CVE-2015-3959
CVE.ORG link : CVE-2015-3959
JSON object : View
Products Affected
garrettcom
- magnum_10k_firmware
- magnum_6k_firmware
CWE