Vulnerabilities > Verizon > Wireless Network Extender > scs.2u01

DATE CVE VULNERABILITY TITLE RISK
2013-07-18 CVE-2013-4877 Improper Authentication vulnerability in Verizon Wireless Network Extender Scs26Uc4/Scs2U01
The Verizon Wireless Network Extender SCS-26UC4 and SCS-2U01 does not use CAVE authentication, which makes it easier for remote attackers to obtain ESN and MIN values from arbitrary phones, and conduct cloning attacks, by sniffing the network for registration packets.
local
high complexity
verizon CWE-287
2.6
2013-07-18 CVE-2013-4876 Credentials Management vulnerability in Verizon Wireless Network Extender Scs2U01
The Verizon Wireless Network Extender SCS-2U01 has a hardcoded password for the root account, which makes it easier for physically proximate attackers to obtain administrative access by leveraging a login prompt.
local
high complexity
verizon CWE-255
6.2
2013-07-18 CVE-2013-4875 Improper Authentication vulnerability in Verizon Wireless Network Extender Scs2U01
The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate attackers to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt.
local
high complexity
verizon CWE-287
6.2