First published: Thu Feb 18 2016(Updated: )
The password-sync feature on Belden Hirschmann Classic Platform switches L2B before 05.3.07 and L2E, L2P, L3E, and L3P before 09.0.06 sets an SNMP community to the same string as the administrator password, which allows remote attackers to obtain sensitive information by sniffing the network.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belden Hirschmann Firmware | =05.3.06 | |
Belden Hirschmann L2b | ||
Belden Hirschmann Firmware | <=09.0.05 | |
Belden Hirschmann L2e | ||
Belden Hirschmann L2p | ||
Belden Hirschmann L3e | ||
Belden Hirschmann L3p |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2509 is rated as a high severity vulnerability due to the risk of sensitive information disclosure.
To mitigate CVE-2016-2509, update the firmware of the affected Belden Hirschmann switches to a version that is not vulnerable.
Devices running Belden Hirschmann Classic Platform switches L2B before version 05.3.07 and L2E, L2P, L3E, and L3P before version 09.0.06 are affected by CVE-2016-2509.
CVE-2016-2509 allows remote attackers to obtain sensitive information by sniffing the network traffic.
CVE-2016-2509 exploits the password-sync feature that sets an SNMP community string to the same value as the administrator password.