| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.5 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in Cisco Wireless Control System up to 3.x. Affected is an unknown function. This manipulation causes cleartext storage. This vulnerability appears as CVE-2006-3286. There is no available exploit. It is recommended to strengthen authentication.
Details
A vulnerability has been found in Cisco Wireless Control System up to 3.x and classified as critical. Affected by this vulnerability is an unknown code. The manipulation with an unknown input leads to a cleartext storage vulnerability. The CWE definition for the vulnerability is CWE-312. The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
The internal database in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(63) stores a hard-coded username and password in plaintext within unspecified files, which allows remote authenticated users to access the database (aka bug CSCsd15951).
The weakness was presented 06/28/2006 (Website). It is possible to read the advisory at cisco.com. This vulnerability is known as CVE-2006-3286 since 06/28/2006. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1555 according to MITRE ATT&CK.
It is declared as proof-of-concept.
Upgrading to version 3.2(63) eliminates this vulnerability. It is possible to mitigate the problem by adding an authentication mechanism. The best possible mitigation is suggested to be adding authentication.
The vulnerability is also documented in the databases at X-Force (27438), SecurityFocus (BID 18701†), OSVDB (26883†), Secunia (SA20870†) and SecurityTracker (ID 1016398†). See VDB-31067, VDB-31066, VDB-31065 and VDB-31064 for similar entries. Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.5
VulDB Base Score: 7.3
VulDB Temp Score: 6.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cleartext storageCWE: CWE-312 / CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: AuthenticationStatus: 🔍
Upgrade: Wireless Control System 3.2(63)
Timeline
06/28/2006 🔍06/28/2006 🔍
06/28/2006 🔍
06/28/2006 🔍
06/28/2006 🔍
06/29/2006 🔍
06/29/2006 🔍
03/12/2015 🔍
09/16/2017 🔍
Sources
Vendor: cisco.comAdvisory: cisco.com
Status: Confirmed
CVE: CVE-2006-3286 (🔍)
GCVE (CVE): GCVE-0-2006-3286
GCVE (VulDB): GCVE-100-31063
X-Force: 27438 - Cisco Wireless Control System (WCS) default database account
SecurityFocus: 18701 - Cisco Wireless Control System Multiple Security Vulnerabilities
Secunia: 20870 - Cisco Wireless Control System Multiple Vulnerabilities, Moderately Critical
OSVDB: 26883 - Cisco Wireless Control System (WCS) Internal Database Cleartext Account Disclosure
SecurityTracker: 1016398 - Cisco Wireless Control System Lets Remote Users Read/Write Files, View Sensitive Information, Access the Systems, and Conduct Cross-Site Scripting Attacks
Vupen: ADV-2006-2583
See also: 🔍
Entry
Created: 03/12/2015 14:25Updated: 09/16/2017 10:45
Changes: 03/12/2015 14:25 (62), 09/16/2017 10:45 (6)
Complete: 🔍
Cache ID: 216:D20:103
Be aware that VulDB is the high quality source for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.