Executive Summary

Summary
Title Multiple Vulnerabilities in Wireless Control System
Informations
Name cisco-sa-20060628-wcs First vendor Publication 2006-06-26
Vendor Cisco Last vendor Modification 2007-06-01
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cisco Wireless Control System (WCS) contains multiple vulnerabilities which may allow a remote user to access sensitive configuration information about access points managed by WCS, read from and write to arbitrary files on a WCS system, log in to a WCS system with a default administrator password, execute script code in a WCS user's web browser, and access directories which may reveal sensitive WCS configuration information. There are workarounds for several, but not all, of these vulnerabilities. See the Workarounds section for more information. Cisco has made free software available to address these vulnerabilities for affected customers.

Original Source

Url : http://www.cisco.com/warp/public/707/cisco-sa-20060628-wcs.shtml

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1

Open Source Vulnerability Database (OSVDB)

Id Description
26884 Cisco Wireless Control System (WCS) Internal Database Persistent Account Remo...

By default, Wireless Control System installs with an unspecified hidden backdoor password. This allows attackers to trivially access the program or system.
26883 Cisco Wireless Control System (WCS) Internal Database Cleartext Account Discl...

Wireless Control System contains a flaw that may lead to an unauthorized information disclosure. Several WCS files contain the undocumented database username and password (OSVDB 26882) stored in cleartext, resulting in a loss of confidentiality.
26882 Cisco Wireless Control System (WCS) Default root Account Password

By default, Wireless Control System installs with a default password. The "root" account has a password of "public" which is publicly known and documented. This allows attackers to trivially access the program or system.
26881 Cisco Wireless Control System (WCS) TFTP Server Unspecified File Manipulation

Wireless Control System contains an unspecified flaw that may allow a malicious user to read and write arbitrary files if the path chosen for the root of the TFTP server contains a space. It is possible that the flaw may allow arbitrary file manipulation by a remote attacker resulting in a loss of integrity.
26880 Cisco Wireless Control System (WCS) HTTP Interface Login Page Unspecified XSS

Wireless Control System contains an unspecified flaw that allows a remote cross site scripting attack. This could allow a user to create a specially crafted URL referencing the HTTP interface login page that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
26879 Cisco Wireless Control System (WCS) HTTP Server Permission Weakness Informati...

Wireless Control System contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by inadequate access controls on unspecified directories, which may disclose username and/or directory path information resulting in a loss of confidentiality.