VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2976
unified_wireless_network_solution_software: The controller in Cisco Unified Wireless Network (U...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2976

Original

The controller in Cisco Unified Wireless Network (UWN) Solution 7.x through 7.0.98.0 has (1) a default SNMP read-only community of public, (2) a default SNMP read-write community of private, and a value of "default" for the (3) SNMP v3 username, (4) SNMP v3 authentication password, and (5) SNMP v3 privacy password, which makes it easier for remote attackers to obtain access.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-08-10
Source Information Category:
Advisory, Alert
Last Updated:
2010-08-10




Affected Product Tags
cpe:/o:cisco:unified_wireless_network_solution_software:7.0
cpe:/o:cisco:unified_wireless_network_solution_software:7.0.98.0
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
CONFIRM http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html




Vulnerability Type Credentials Management (CWE-255)





Copyright © 2010 JPCERT/CC All Rights Reserved.