Vulnerability Details : CVE-2006-3291
The web interface on Cisco IOS 12.3(8)JA and 12.3(8)JA1, as used on the Cisco Wireless Access Point and Wireless Bridge, reconfigures itself when it is changed to use the "Local User List Only (Individual Passwords)" setting, which removes all security and password configurations and allows remote attackers to access the system.
Products affected by CVE-2006-3291
- cpe:2.3:o:cisco:ios:12.3\(8\)ja1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.3\(8\)ja:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3291
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3291
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2006-3291
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3291
-
http://www.cisco.com/warp/public/707/cisco-sa-20060628-ap.shtml
Patch
-
http://www.vupen.com/english/advisories/2006/2584
-
http://www.kb.cert.org/vuls/id/544484
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27437
-
http://securitytracker.com/id?1016399
-
http://www.securityfocus.com/bid/18704
Jump to