First published: Wed Jun 28 2006(Updated: )
Cisco Wireless Control System (WCS) for Linux and Windows 4.0(1) and earlier uses a default administrator username "root" and password "public," which allows remote attackers to gain access (aka bug CSCse21391).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless Control System software | <=4.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3287 has a high severity rating due to the use of a default administrator username and password that can be easily exploited.
To fix CVE-2006-3287, change the default administrator username and password to a strong, unique combination.
CVE-2006-3287 affects Cisco Wireless Control System (WCS) versions 4.0(1) and earlier.
Yes, CVE-2006-3287 can be exploited remotely, allowing attackers to gain unauthorized access.
No, CVE-2006-3287 does not affect versions of Cisco Wireless Control System released after 4.0(1), as default credentials have been addressed.