Cisco Aironet Active Sensor

CPE Details

Cisco Aironet Active Sensor
-
2019-03-06
19h13 +00:00
2019-03-06
19h13 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:cisco:aironet_active_sensor:-:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

aironet_active_sensor

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-1675 2019-02-07 20h00 +00:00 A vulnerability in the default configuration of the Cisco Aironet Active Sensor could allow an unauthenticated, remote attacker to restart the sensor. The vulnerability is due to a default local account with a static password. The account has privileges only to reboot the device. An attacker could exploit this vulnerability by guessing the account name and password to access the CLI. A successful exploit could allow the attacker to reboot the device repeatedly, creating a denial of service (DoS) condition. It is not possible to change the configuration or view sensitive data with this account. Versions prior to DNAC1.2.8 are affected.
7.5
High