SNMP: Linksys WAP55AG Community String Disclosure

This signature detects attempts to exploit a known vulnerability in Linksys Wireless Access Point model WAP55AG. Attackers can send a specific Object ID (OID) to the WAP55AG to gain access to the SNMP community strings on the device.

Extended Description

Linksys WAP55AG appliance has been reported prone to an insecure default configuration vulnerability. It has been reported that all SNMP MIB (Management Information Base) community strings, even read/write strings may be disclosed to a remote attacker if the attacker makes certain queries to the affected appliance. An attacker may disclose sensitive information in this manner. Although unconfirmed, it may also be possible for the attacker to manipulate the appliance configuration through writeable strings.

Affected Products

Linksys wap55ag

References

BugTraq: 9688

CVE: CVE-2004-0312

Short Name
SNMP:DANGEROUS:LINKSYS-WAP55AG
Severity
Minor
Recommended
False
Recommended Action
None
Category
SNMP
Keywords
CVE-2004-0312 Community Disclosure Linksys String WAP55AG bid:9688
Release Date
02/26/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Linksys

CVSS Score

6.4

Found a potential security threat?