Vulnerability Details : CVE-2006-3291
The web interface on Cisco IOS 12.3(8)JA and 12.3(8)JA1, as used on the Cisco Wireless Access Point and Wireless Bridge, reconfigures itself when it is changed to use the "Local User List Only (Individual Passwords)" setting, which removes all security and password configurations and allows remote attackers to access the system.
Exploit prediction scoring system (EPSS) score for CVE-2006-3291
Probability of exploitation activity in the next 30 days: 0.68%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 78 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3291
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2006-3291
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3291
-
http://www.cisco.com/warp/public/707/cisco-sa-20060628-ap.shtml
Patch
-
http://www.vupen.com/english/advisories/2006/2584
-
http://www.kb.cert.org/vuls/id/544484
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27437
-
http://securitytracker.com/id?1016399
-
http://www.securityfocus.com/bid/18704
Products affected by CVE-2006-3291
- cpe:2.3:o:cisco:ios:12.3\(8\)ja1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:12.3\(8\)ja:*:*:*:*:*:*:*