Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ceragon vulnerabilities and exploits
(subscribe to this query)
694
VMScore
CVE-2015-0924
Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote malicious users to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
Ceragon Fiberair Ip-10g -
Ceragon Fiberair Ip-10c -
Ceragon Fiberair Ip-10e -
668
VMScore
CVE-2016-10309
In the GUI of Ceragon FibeAir IP-10 (prior to 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
Ceragon Fibeair Ip-10 Firmware
755
VMScore
CVE-2015-0936
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote malicious users to obtain SSH access by leveraging knowledge of the private key.
Ceragon Fibeair Ip-10 Firmware -
1 EDB exploit
668
VMScore
CVE-2017-9137
Ceragon FibeAir IP-10 wireless radios up to and including 7.2.0 have a default password of mateidu for the mateidu account (a hidden user account established by the vendor). This account can be accessed via both the web interface and SSH. In the web interface, this simply grants ...
Ceragon Fiberair Ip-10 Firmware
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started