Executive Summary
Summary | |
---|---|
Title | Multiple Vulnerabilities in Wireless Control System |
Informations | |||
---|---|---|---|
Name | cisco-sa-20060628-wcs | First vendor Publication | 2006-06-26 |
Vendor | Cisco | Last vendor Modification | 2007-06-01 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Wireless Control System (WCS) contains multiple vulnerabilities which may allow a remote user to access sensitive configuration information about access points managed by WCS, read from and write to arbitrary files on a WCS system, log in to a WCS system with a default administrator password, execute script code in a WCS user's web browser, and access directories which may reveal sensitive WCS configuration information. There are workarounds for several, but not all, of these vulnerabilities. See the Workarounds section for more information. Cisco has made free software available to address these vulnerabilities for affected customers. |
Original Source
Url : http://www.cisco.com/warp/public/707/cisco-sa-20060628-wcs.shtml |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Hardware | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
26884 | Cisco Wireless Control System (WCS) Internal Database Persistent Account Remo... By default, Wireless Control System installs with an unspecified hidden backdoor password. This allows attackers to trivially access the program or system. |
26883 | Cisco Wireless Control System (WCS) Internal Database Cleartext Account Discl... Wireless Control System contains a flaw that may lead to an unauthorized information disclosure. Several WCS files contain the undocumented database username and password (OSVDB 26882) stored in cleartext, resulting in a loss of confidentiality. |
26882 | Cisco Wireless Control System (WCS) Default root Account Password By default, Wireless Control System installs with a default password. The "root" account has a password of "public" which is publicly known and documented. This allows attackers to trivially access the program or system. |
26881 | Cisco Wireless Control System (WCS) TFTP Server Unspecified File Manipulation Wireless Control System contains an unspecified flaw that may allow a malicious user to read and write arbitrary files if the path chosen for the root of the TFTP server contains a space. It is possible that the flaw may allow arbitrary file manipulation by a remote attacker resulting in a loss of integrity. |
26880 | Cisco Wireless Control System (WCS) HTTP Interface Login Page Unspecified XSS Wireless Control System contains an unspecified flaw that allows a remote cross site scripting attack. This could allow a user to create a specially crafted URL referencing the HTTP interface login page that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
26879 | Cisco Wireless Control System (WCS) HTTP Server Permission Weakness Informati... Wireless Control System contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by inadequate access controls on unspecified directories, which may disclose username and/or directory path information resulting in a loss of confidentiality. |