Known Vulnerabilities for products from Ceragon

Listed below are 4 of the newest known vulnerabilities associated with the vendor "Ceragon".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Additional devices specifications by Ceragon can be found at device.report : Ceragon

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2017-9137 Ceragon FibeAir IP-10 wireless radios through 7.2.0 have a default password of mateidu for the mateidu account (a hidden user... 7.3 - HIGH 2017-05-21 2019-10-03
CVE-2016-10309 In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROS... 9.8 - CRITICAL 2017-03-30 2017-04-05
CVE-2015-0936 Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote att... 9.8 - CRITICAL 2017-06-01 2021-06-17
CVE-2015-0924 Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obt... 7.8 - HIGH 2015-01-17 2017-05-27

Known software with vulnerabilities from Ceragon

Type Vendor Product Version
HardwareCeragonFiberair Ip-10c-
HardwareCeragonFiberair Ip-10e-
HardwareCeragonFiberair Ip-10g-