Описание
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
Ссылки
- Third Party AdvisoryVDB Entry
- PatchVendor Advisory
- Broken Link
- Third Party AdvisoryVDB Entry
- Permissions Required
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- PatchVendor Advisory
- Broken Link
- Third Party AdvisoryVDB Entry
- Permissions Required
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия от 3.2 (включая) до 3.2.185.0 (исключая)Версия от 4.0 (включая) до 4.0.206.0 (исключая)
Одновременно
Одно из
cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:h:cisco:aironet_1000-series:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1500-series:-:*:*:*:*:*:*:*
EPSS
Процентиль: 26%
0.00092
Низкий
6.2 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
EPSS
Процентиль: 26%
0.00092
Низкий
6.2 Medium
CVSS2
Дефекты
NVD-CWE-Other