Page 15 of 73 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cisco Aironet 340 Series wireless bridge before 8.55 does not properly disable access to the web interface, which allows remote attackers to modify its configuration. • http://www.cisco.com/warp/public/707/Aironet340-pub.shtml http://www.osvdb.org/5597 https://exchange.xforce.ibmcloud.com/vulnerabilities/6200 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Cisco 340-series Aironet access point using firmware 11.01 does not use 6 of the 24 available IV bits for WEP encryption, which makes it easier for remote attackers to mount brute force attacks. • http://www.cs.jhu.edu/~seny/pubs/wince802.pdf •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

Cisco AP340 base station produces predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. • https://www.exploit-db.com/exploits/19522 http://www.cs.jhu.edu/~seny/pubs/wince802.pdf •