Known Vulnerabilities for products from Ceragon
Listed below are 4 of the newest known vulnerabilities associated with the vendor "Ceragon".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
Additional devices specifications by Ceragon can be found at device.report : Ceragon
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2017-9137 | Ceragon FibeAir IP-10 wireless radios through 7.2.0 have a default password of mateidu for the mateidu account (a hidden user... | 7.3 - HIGH | 2017-05-21 | 2019-10-03 |
| CVE-2016-10309 | In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROS... | 9.8 - CRITICAL | 2017-03-30 | 2017-04-05 |
| CVE-2015-0936 | Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote att... | 9.8 - CRITICAL | 2017-06-01 | 2021-06-17 |
| CVE-2015-0924 | Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obt... | 7.8 - HIGH | 2015-01-17 | 2017-05-27 |
Known software with vulnerabilities from Ceragon
| Type | Vendor | Product | Version |
|---|---|---|---|
| Hardware | Ceragon | Fiberair Ip-10c | - |
| Hardware | Ceragon | Fiberair Ip-10e | - |
| Hardware | Ceragon | Fiberair Ip-10g | - |