Vulnerabilities > Verizon > Wireless Network Extender > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-07-18 | CVE-2013-4876 | Credentials Management vulnerability in Verizon Wireless Network Extender Scs2U01 The Verizon Wireless Network Extender SCS-2U01 has a hardcoded password for the root account, which makes it easier for physically proximate attackers to obtain administrative access by leveraging a login prompt. | 6.2 |
2013-07-18 | CVE-2013-4875 | Improper Authentication vulnerability in Verizon Wireless Network Extender Scs2U01 The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate attackers to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt. | 6.2 |
2013-07-18 | CVE-2013-4874 | Improper Authentication vulnerability in Verizon Wireless Network Extender Scs26Uc4 The Uboot bootloader on the Verizon Wireless Network Extender SCS-26UC4 allows physically proximate attackers to obtain root access by connecting a crafted HDMI cable and using a sys session to modify the ramboot environment variable. | 6.2 |