7.5
CVSSv3

CVE-2019-1675

Published: 07/02/2019 Updated: 09/10/2019
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the default configuration of the Cisco Aironet Active Sensor could allow an unauthenticated, remote malicious user to restart the sensor. The vulnerability is due to a default local account with a static password. The account has privileges only to reboot the device. An attacker could exploit this vulnerability by guessing the account name and password to access the CLI. A successful exploit could allow the malicious user to reboot the device repeatedly, creating a denial of service (DoS) condition. It is not possible to change the configuration or view sensitive data with this account. Versions prior to DNAC1.2.8 are affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco aironet active sensor -

cisco digital network architecture center

Vendor Advisories

A vulnerability in the default configuration of the Cisco Aironet Active Sensor could allow an unauthenticated, remote attacker to restart the sensor The vulnerability is due to a default local account with a static password The account has privileges only to reboot the device An attacker could exploit this vulnerability by guessing the account ...