Vulnerabilities > CVE-2015-0924 - Credentials Management vulnerability in Ceragon Fiberair Ip-10C, Fiberair Ip-10E and Fiberair Ip-10G

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
COMPLETE
Availability impact
NONE
network
low complexity
ceragon
CWE-255

Summary

Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.

Vulnerable Configurations

Part Description Count
Hardware
Ceragon
3

Common Weakness Enumeration (CWE)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/131259/ceragonfibeair-disclose.txt
idPACKETSTORM:131259
last seen2016-12-05
published2015-04-02
reporterTod Beardsley
sourcehttps://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html
titleCeragon FibeAir IP-10 SSH Private Key Exposure