lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-id: <201601131143.6.air@psirt.cisco.com>
Date: Wed, 13 Jan 2016 11:43:53 -0500
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco Aironet 1800 Series Access Point Default Static Account Credentials Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Aironet 1800 Series Access Point Default Static Account Credentials Vulnerability

Advisory ID: cisco-sa-20160113-air

Revision 1.0

For Public Release 2016 January 13 16:00 UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

A vulnerability in Cisco Aironet 1800 Series Access Point devices could
allow an unauthenticated, remote attacker to log in to the device by 
using a default account that has a static password. By default, the 
account does not have full administrative privileges.

The vulnerability is due to the presence of a default user account that 
is created when the device is installed. An attacker could exploit this 
vulnerability by logging in to the device by using the default account, 
which could allow the attacker to gain unauthorized access to the device.

Cisco released software updates that address this vulnerability. There 
are no workarounds that mitigate this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-air
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=WE2t
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ