Vulnerability Description
Cisco 2700 Series Wireless Location Appliances before 2.1.34.0 have a default administrator username "root" and password "password," which allows remote attackers to obtain administrative privileges, aka Bug ID CSCsb92893.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | 2700 Wireless Location Appliance | 1.1.73.0 |
References
- http://securitytracker.com/id?1017056
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080758bae.sPatch
- http://www.osvdb.org/30913
- http://www.securityfocus.com/bid/20490
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29497
- http://securitytracker.com/id?1017056
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080758bae.sPatch
- http://www.osvdb.org/30913
- http://www.securityfocus.com/bid/20490
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29497
FAQ
What is CVE-2006-5288?
CVE-2006-5288 is a vulnerability with a CVSS score of 10.0 (HIGH). Cisco 2700 Series Wireless Location Appliances before 2.1.34.0 have a default administrator username "root" and password "password," which allows remote attackers to obtain administrative privileges, ...
How severe is CVE-2006-5288?
CVE-2006-5288 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5288?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco 2700 Wireless Location Appliance.