Unrated severityNVD Advisory· Published Jan 17, 2015· Updated May 6, 2026
CVE-2015-0924
CVE-2015-0924
Description
Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session.
Affected products
3- cpe:2.3:h:ceragon:fiberair_ip-10c:-:*:*:*:*:*:*:*
- cpe:2.3:h:ceragon:fiberair_ip-10e:-:*:*:*:*:*:*:*
- cpe:2.3:h:ceragon:fiberair_ip-10g:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.kb.cert.org/vuls/id/936356nvdThird Party AdvisoryUS Government Resource
News mentions
0No linked articles in our index yet.