Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-2040 | First vendor Publication | 2007-04-16 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:H/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | High |
Cvss Expoit Score | 1.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2040 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
34133 | Cisco Aironet Lightweight Access Points Persistent Admin Password By default, Aironet 1000 & 1500 Series Lightweight Access Points install with a default password. This allows attackers with console access to trivially access the system. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:17:41 |
|
2024-11-28 12:12:03 |
|
2020-05-23 01:38:05 |
|
2020-05-23 00:19:35 |
|
2019-08-14 17:19:23 |
|
2018-10-31 00:19:48 |
|
2017-11-22 12:02:17 |
|
2017-07-29 12:02:09 |
|
2016-09-30 01:01:24 |
|
2016-09-08 01:00:33 |
|
2016-06-28 23:55:24 |
|
2016-06-28 16:22:45 |
|
2016-04-26 15:59:56 |
|
2013-05-11 10:23:07 |
|