D-Link DWL-1000AP Wireless LAN Access Point stores admin password in plain text in the "public" MIB
|dlink-ap-public-mib (7733)||Medium Risk|
The D-Link DWL-1000AP Wireless LAN Access Point could allow a remote attacker to obtain the administrative password for the wireless network. A remote attacker using an SNMP client can browse the "public" MIB to obtain the administrative password, which is stored in plain text. This allows the attacker to obtain access to the wireless network, change the configuration of the device, or cause a denial of service attack.
No remedy available as of February 1, 2014.
- BugTraq Mailing List, Fri Dec 21 2001 - 13:26:55 CST: D-Link DWL-1000AP can be compromised because of SNMP configuration.
- BID-3735: D-Link DWL-1000AP Wireless LAN Access Point Plaintext Password Vulnerability
- CVE-2001-1220: D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point stores the administrative password in plaintext in the default Management Information Base (MIB), which allows remote attackers to gain administrative privileges.
- OSVDB ID: 9403: D-Link DWL-1000AP MIB Cleartext Admin Password
- D-Link DWL-1000AP
Dec 21, 2001
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this