
4/8/2010

16/9/2024
CVE-2010-2966
First published: Wed Aug 04 2010(Updated: )
The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and earlier uses the LOGIN_USER_NAME and LOGIN_USER_PASSWORD (aka LOGIN_PASSWORD) parameters to create hardcoded credentials, which makes it easier for remote attackers to obtain access via a (1) telnet, (2) rlogin, or (3) FTP session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|
Wind River VxWorks | =6 | |
Wind River VxWorks | =5 | |
Wind River VxWorks | =6.4 | |
Wind River VxWorks | <=6.8 | |
Wind River VxWorks | =5.5 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2010-2966?
CVE-2010-2966 is classified as a high severity vulnerability due to its potential to allow unauthorized remote access.
How do I fix CVE-2010-2966?
To fix CVE-2010-2966, it is recommended to upgrade to a patched version of Wind River VxWorks that eliminates the use of hardcoded credentials.
What types of systems are affected by CVE-2010-2966?
CVE-2010-2966 affects Wind River VxWorks versions 5.x and 6.x.
What kind of attacks can exploit CVE-2010-2966?
CVE-2010-2966 can be exploited through telnet, rlogin, or FTP sessions.
Is CVE-2010-2966 related to default credentials?
Yes, CVE-2010-2966 involves hardcoded credentials which can be exploited as default credentials.
- agent/references
- agent/type
- collector/mitre-cve
- source/MITRE
- agent/author
- agent/last-modified-date
- agent/severity
- agent/weakness
- agent/description
- agent/event
- agent/first-publish-date
- collector/nvd-historical
- agent/software-canonical-lookup-request
- collector/nvd-index
- agent/tags
- agent/softwarecombine
- agent/source
- vendor/windriver
- canonical/wind river vxworks
- version/wind river vxworks/6
- version/wind river vxworks/5
- version/wind river vxworks/6.4
- version/wind river vxworks/6.8
- version/wind river vxworks/5.5
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203