Vulnerability Description
In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ceragon | Fibeair Ip-10 Firmware | <= 7.1.0 |
| Ceragon | Fibeair Ip-10 | - |
Related Weaknesses (CWE)
References
- http://blog.iancaling.com/post/145973147383Third Party Advisory
- http://www.securityfocus.com/bid/91263
- http://blog.iancaling.com/post/145973147383Third Party Advisory
- http://www.securityfocus.com/bid/91263
FAQ
What is CVE-2016-10309?
CVE-2016-10309 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
How severe is CVE-2016-10309?
CVE-2016-10309 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10309?
Check the references section above for vendor advisories and patch information. Affected products include: Ceragon Fibeair Ip-10 Firmware, Ceragon Fibeair Ip-10.