First published: Wed Jun 28 2006(Updated: )
The internal database in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(63) stores a hard-coded username and password in plaintext within unspecified files, which allows remote authenticated users to access the database (aka bug CSCsd15951).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless Control System software | <=3.2\(51\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3286 has a moderate severity level due to the exposure of hard-coded credentials in plaintext.
To fix CVE-2006-3286, upgrade the Cisco Wireless Control System to version 3.2(63) or later.
CVE-2006-3286 affects Cisco Wireless Control System versions prior to 3.2(63) on both Linux and Windows platforms.
The risks associated with CVE-2006-3286 include unauthorized access to the internal database by remote authenticated users.
CVE-2006-3286 is less of a concern in modern systems, provided they have been updated to the latest versions and security patches.