First published: Fri Jan 15 2016(Updated: )
Cisco Aironet 1800 devices with software 7.2, 7.3, 7.4, 8.1(112.3), 8.1(112.4), and 8.1(15.14) have a default account, which makes it easier for remote attackers to obtain access via unspecified vectors, aka Bug ID CSCuw58062.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Access Point Software | =7.2_base | |
Cisco Access Point Software | =7.3_base | |
Cisco Access Point Software | =7.4_base | |
Cisco Access Point Software | =8.1\(15.14\) | |
Cisco Access Point Software | =8.1\(112.3\) | |
Cisco Access Point Software | =8.1\(112.4\) | |
Cisco Aironet 1830E Firmware | ||
Cisco Aironet 1830i Access Point | ||
Cisco Aironet 1850e Access Point | ||
Cisco Aironet 1850i Access Point |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6336 is considered a high severity vulnerability due to the presence of a default account that allows for easier unauthorized access.
To fix CVE-2015-6336, you should disable the default account and apply any available software updates from Cisco for the affected versions.
CVE-2015-6336 affects Cisco Aironet 1800 devices with specific software versions including 7.2, 7.3, 7.4, and 8.1 series.
Organizations using the affected Cisco Aironet devices could be at risk of exploitation by remote attackers.
Exploitation of CVE-2015-6336 could lead to unauthorized access to network configurations and sensitive data.