Short Name |
SNMP:DANGEROUS:LINKSYS-WAP55AG |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
SNMP |
Keywords |
Linksys WAP55AG Community String Disclosure |
Release Date |
2004/02/25 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Linksys Wireless Access Point model WAP55AG. Attackers can send a specific Object ID (OID) to the WAP55AG to gain access to the SNMP community strings on the device.
Linksys WAP55AG appliance has been reported prone to an insecure default configuration vulnerability. It has been reported that all SNMP MIB (Management Information Base) community strings, even read/write strings may be disclosed to a remote attacker if the attacker makes certain queries to the affected appliance. An attacker may disclose sensitive information in this manner. Although unconfirmed, it may also be possible for the attacker to manipulate the appliance configuration through writeable strings.