Vulnerabilities > Ceragon
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-06-01 | CVE-2015-0936 | Key Management Errors vulnerability in Ceragon Fibeair Ip-10 Firmware Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key. | 7.5 |
2017-05-21 | CVE-2017-9137 | Insecure Default Initialization of Resource vulnerability in Ceragon Fiberair Ip-10 Firmware Ceragon FibeAir IP-10 wireless radios through 7.2.0 have a default password of mateidu for the mateidu account (a hidden user account established by the vendor). | 7.5 |
2017-03-30 | CVE-2016-10309 | Improper Authentication vulnerability in Ceragon Fibeair Ip-10 Firmware In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser. | 7.5 |
2015-01-17 | CVE-2015-0924 | Credentials Management vulnerability in Ceragon Fiberair Ip-10C, Fiberair Ip-10E and Fiberair Ip-10G Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session. | 7.8 |