CVE Details for CVE: CVE-2015-0924
Summary
Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
Timestamps
Last major update 27-05-2017 - 01:29
Published 17-01-2015 - 11:59
Last modified 27-05-2017 - 01:29
Vulnerable Configurations
  • cpe:2.3:h:ceragon:fiberair_ip-10g:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fiberair_ip-10g:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ceragon:fiberair_ip-10c:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fiberair_ip-10c:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ceragon:fiberair_ip-10e:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fiberair_ip-10e:-:*:*:*:*:*:*:*
CAPEC
Click the CAPEC title to display a description
CWE
CVSS
Base
7.8
Impact
6.9
Exploitability
10.0
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE COMPLETE NONE
CVSS3
None
VIA4 references
cvss-vector via4
AV:N/AC:L/Au:N/C:N/I:C/A:N
refmap via4
cert-vn VU#936356