High severity7.3NVD Advisory· Published May 21, 2017· Updated May 13, 2026
CVE-2017-9137
CVE-2017-9137
Description
Ceragon FibeAir IP-10 wireless radios through 7.2.0 have a default password of mateidu for the mateidu account (a hidden user account established by the vendor). This account can be accessed via both the web interface and SSH. In the web interface, this simply grants an attacker read-only access to the device's settings. However, when using SSH, this gives an attacker access to a Linux shell. NOTE: the vendor has commented "The mateidu user is a known user, which is mentioned in the FibeAir IP-10 User Guide. Customers are instructed to change the mateidu user password. Changing the user password fully solves the vulnerability."
Affected products
1- cpe:2.3:o:ceragon:fiberair_ip-10_firmware:*:*:*:*:*:*:*:*Range: <=7.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- blog.iancaling.com/post/160817658078nvdThird Party Advisory
News mentions
0No linked articles in our index yet.