Vulnerability Description
Trango Altum AC600 devices have a built-in, hidden root account, with a default password of abcd1234. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trango | A600 Firmware | - |
| Trango | A600-19-Us | - |
| Trango | A600-25-Us | - |
| Trango | A600-Ext-Us | - |
Related Weaknesses (CWE)
References
- http://blog.iancaling.com/post/153011925478Third Party Advisory
- http://blog.iancaling.com/post/155395764003Third Party Advisory
- http://www.securityfocus.com/bid/97241Third Party AdvisoryVDB Entry
- http://blog.iancaling.com/post/153011925478Third Party Advisory
- http://blog.iancaling.com/post/155395764003Third Party Advisory
- http://www.securityfocus.com/bid/97241Third Party AdvisoryVDB Entry
FAQ
What is CVE-2016-10306?
CVE-2016-10306 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Trango Altum AC600 devices have a built-in, hidden root account, with a default password of abcd1234. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNI...
How severe is CVE-2016-10306?
CVE-2016-10306 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10306?
Check the references section above for vendor advisories and patch information. Affected products include: Trango A600 Firmware, Trango A600-19-Us, Trango A600-25-Us, Trango A600-Ext-Us.