Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
References
Link | Resource |
---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20070412-wlc.shtml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/23461 | Third Party Advisory VDB Entry |
http://securitytracker.com/id?1017908 | Third Party Advisory VDB Entry |
http://www.osvdb.org/34133 | Broken Link |
http://www.vupen.com/english/advisories/2007/1368 | Permissions Required |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33610 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2007-04-16 14:19
Updated : 2019-08-14 04:28
NVD link : CVE-2007-2040
Mitre link : CVE-2007-2040
JSON object : View
CWE
Products Affected
cisco
- aironet_1500-series
- aironet_1000-series
- wireless_lan_controller_software