CVE-2016-2509
Summary
| CVE | CVE-2016-2509 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-02-18 22:59:00 UTC |
| Updated | 2016-03-23 00:54:00 UTC |
| Description | The password-sync feature on Belden Hirschmann Classic Platform switches L2B before 05.3.07 and L2E, L2P, L3E, and L3P before 09.0.06 sets an SNMP community to the same string as the administrator password, which allows remote attackers to obtain sensitive information by sniffing the network. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Belden | Hirschmann Firmware | 05.3.06 | All | All | All |
| Operating System | Belden | Hirschmann Firmware | All | All | All | All |
| Operating System | Belden | Hirschmann Firmware | 05.3.06 | All | All | All |
| Hardware | Belden | Hirschmann L2b | - | All | All | All |
| Hardware | Belden | Hirschmann L2b | - | All | All | All |
| Hardware | Belden | Hirschmann L2e | - | All | All | All |
| Hardware | Belden | Hirschmann L2e | - | All | All | All |
| Hardware | Belden | Hirschmann L2p | - | All | All | All |
| Hardware | Belden | Hirschmann L2p | - | All | All | All |
| Hardware | Belden | Hirschmann L3e | - | All | All | All |
| Hardware | Belden | Hirschmann L3e | - | All | All | All |
| Hardware | Belden | Hirschmann L3p | - | All | All | All |
| Hardware | Belden | Hirschmann L3p | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Page Not Found | CONFIRM | www.belden.com | Vendor Advisory |
| Vulnerability Note VU#507216 - Hirschmann "Classic Platform" switches reveal administrator password in SNMP community string by default | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.