Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.kb.cert.org/vuls/id/936356 | Third Party Advisory US Government Resource | 
| http://www.kb.cert.org/vuls/id/936356 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:24
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.kb.cert.org/vuls/id/936356 - Third Party Advisory, US Government Resource | 
Information
                Published : 2015-01-17 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-0924
Mitre link : CVE-2015-0924
CVE.ORG link : CVE-2015-0924
JSON object : View
Products Affected
                ceragon
- fiberair_ip-10g
- fiberair_ip-10e
- fiberair_ip-10c
CWE
                
                    
                        
                        CWE-255
                        
            Credentials Management Errors
