![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.106709 |
Category: | CISCO |
Title: | Cisco Aironet 1830 Series and 1850 Series Access Points Mobility Express Default Credential Vulnerability |
Summary: | A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series;Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote attacker to take;complete control of an affected device. |
Description: | Summary: A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote attacker to take complete control of an affected device. Vulnerability Insight: The vulnerability is due to the existence of default credentials for an affected device that is running Cisco Mobility Express Software, regardless of whether the device is configured as a master, subordinate, or standalone access point. An attacker who has layer 3 connectivity to an affected device could use Secure Shell (SSH) to log in to the device with elevated privileges. Vulnerability Impact: A successful exploit could allow the attacker to take complete control of the device. Solution: See the referenced vendor advisory for a solution. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-3834 BugTraq ID: 97422 http://www.securityfocus.com/bid/97422 http://www.securitytracker.com/id/1038181 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |