CVE-2016-6552

Published on: 07/13/2018 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Dx-350 from Greenpacket contain the following vulnerability:

Green Packet DX-350 uses non-random default credentials of: root:wimax. A remote network attacker can gain privileged access to a vulnerable device.

  • CVE-2016-6552 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.
  • Affected Vendor/Software: URL Logo Green Packet - WiFi Access Point version DX-350

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Vulnerability Note VU#970379 - Green Packet DX-350 contains insecure default credentials Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#970379
Green Packet DX-350 CVE-2016-6552 Insecure Default Password Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93806

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
HardwareGreenpacketDx-350-AllAllAll
HardwareGreenpacketDx-350-AllAllAll
Operating
System
GreenpacketDx-350 Firmware-AllAllAll
Operating
System
GreenpacketDx-350 Firmware-AllAllAll
  • cpe:2.3:h:greenpacket:dx-350:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:greenpacket:dx-350:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:greenpacket:dx-350_firmware:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:greenpacket:dx-350_firmware:-:*:*:*:*:*:*:*: