First published: Sat Jul 21 2001(Updated: )
SNMP service in Atmel 802.11b VNET-B Access Point 1.3 and earlier, as used in Netgear ME102 and Linksys WAP11, accepts arbitrary community strings with requested MIB modifications, which allows remote attackers to obtain sensitive information such as WEP keys, cause a denial of service, or gain access to the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WAP11 | ||
Netgear ME102 | ||
Atmel 802.11b VNET-B Access Point | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0514 has a high severity rating due to the potential for remote attackers to access sensitive information and disrupt service.
To fix CVE-2001-0514, upgrade the Atmel 802.11b VNET-B Access Point firmware to a version later than 1.3 to mitigate the vulnerability.
The devices affected by CVE-2001-0514 include the Linksys WAP11, Netgear ME102, and Atmel 802.11b VNET-B Access Point up to version 1.3.
Attackers exploiting CVE-2001-0514 can gain access to sensitive data such as WEP keys, perform denial of service attacks, or potentially gain unauthorized access.
While CVE-2001-0514 primarily affects older devices, any operational equipment still using vulnerable firmware can still be at risk.