Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/936356 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/936356 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-01-17 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-0924
Mitre link : CVE-2015-0924
CVE.ORG link : CVE-2015-0924
JSON object : View
Products Affected
ceragon
- fiberair_ip-10c
- fiberair_ip-10e
- fiberair_ip-10g
CWE
CWE-255
Credentials Management Errors