Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ceragon vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2015-0924
Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote malicious users to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
Ceragon Fiberair Ip-10g -
Ceragon Fiberair Ip-10c -
Ceragon Fiberair Ip-10e -
7.5
CVSSv2
CVE-2016-10309
In the GUI of Ceragon FibeAir IP-10 (prior to 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
Ceragon Fibeair Ip-10 Firmware
7.5
CVSSv2
CVE-2015-0936
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote malicious users to obtain SSH access by leveraging knowledge of the private key.
Ceragon Fibeair Ip-10 Firmware -
1 EDB exploit
7.5
CVSSv2
CVE-2017-9137
Ceragon FibeAir IP-10 wireless radios up to and including 7.2.0 have a default password of mateidu for the mateidu account (a hidden user account established by the vendor). This account can be accessed via both the web interface and SSH. In the web interface, this simply grants ...
Ceragon Fiberair Ip-10 Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3400
CVE-2023-7252
CVE-2024-21111
denial of service
CVE-2024-29661
CVE-2024-22856
remote attackers
encryption
CVE-2023-38299
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started