First published: Thu Jun 09 2016(Updated: )
General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ge Multilink Firmware | <=5.5.0 | |
GE Multilink ML1200 Firmware | ||
Ge Multilink ML1600 Firmware | ||
Ge Multilink Ml2400 Firmware | ||
Ge Multilink ML800 Firmware | ||
Ge Multilink ML810 Firmware | ||
Ge Multilink Ml3000 Firmware | ||
GE Multilink ML3100 | ||
Ge Multilink Firmware | <=5.5.0k |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2310 has a high severity level due to the presence of hardcoded credentials that allow unauthorized remote access to configuration settings.
To fix CVE-2016-2310, update the GE Multilink switches to firmware version 5.5.0 or later.
The affected switches include GE Multilink ML800, ML1200, ML1600, ML2400 with firmware before 5.5.0 and ML810, ML3000, and ML3100 with firmware before 5.5.0k.
The potential risks include unauthorized modification of configuration settings and possible disruption of network operations.
There is no effective workaround for CVE-2016-2310, and the recommended action is to update to a secure version as soon as possible.