10
CVSSv2

CVE-2017-3834

Published: 06/04/2017 Updated: 22/04/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote malicious user to take complete control of an affected device. The vulnerability is due to the existence of default credentials for an affected device that is running Cisco Mobility Express Software, regardless of whether the device is configured as a master, subordinate, or standalone access point. An attacker who has layer 3 connectivity to an affected device could use Secure Shell (SSH) to log in to the device with elevated privileges. A successful exploit could allow the malicious user to take complete control of the device. This vulnerability affects Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points that are running an 8.2.x release of Cisco Mobility Express Software prior to Release 8.2.111.0, regardless of whether the device is configured as a master, subordinate, or standalone access point. Release 8.2 was the first release of Cisco Mobility Express Software for next generation Cisco Aironet Access Points. Cisco Bug IDs: CSCva50691.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco aironet_access_point_firmware 8.2.100.0

cisco aironet_access_point_firmware 8.2.102.43

cisco aironet_access_point_firmware 8.2.102.139

cisco aironet_access_point_firmware 8.2.111.0

cisco aironet_access_point_firmware 8.2.121.12

cisco aironet_access_point_firmware 8.2.130.0

cisco aironet_access_point_firmware 90.57

cisco aironet_access_point_firmware 102.0

Vendor Advisories

A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote attacker to take complete control of an affected device The vulnerability is due to the existence of default credentials for an affected device that is running Cisco Mobility Expre ...