First published: Mon Aug 09 2010(Updated: )
The controller in Cisco Unified Wireless Network (UWN) Solution 7.x through 7.0.98.0 has (1) a default SNMP read-only community of public, (2) a default SNMP read-write community of private, and a value of "default" for the (3) SNMP v3 username, (4) SNMP v3 authentication password, and (5) SNMP v3 privacy password, which makes it easier for remote attackers to obtain access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Wireless Network Solution | =7.0 | |
Cisco Unified Wireless Network Solution | =7.0.98.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2976 is classified with a high severity due to the exposure of sensitive SNMP community strings.
To fix CVE-2010-2976, change the default SNMP community strings and SNMP v3 credentials to secure values.
CVE-2010-2976 affects Cisco Unified Wireless Network Solution versions 7.x up to 7.0.98.0.
The risks include unauthorized access to network management functions due to weak default SNMP credentials.
Yes, Cisco has recommended updating to a secure configuration and applying any relevant updates to mitigate CVE-2010-2976.