back to article Cisco admins gear up for a late night – hardcoded password in wireless points nuked

Cisco sysadmins have a busy day ahead of them, with vulnerabilities announced in wireless LAN controllers, the Cisco Identity Services Engine, and Aironet access points. The Aironet 1800 series flaw, CVE-2015-6336, is that old favorite: a hardcoded static password granting access to the device. Luckily, the account with the …

  1. wsm

    Ooops!

    Obviously the fault of rogue engineers. Nothing to do with management or the integrity of the company.

    1. Ole Juul

      Re: Ooops!

      Obviously the fault of rogue engineers. Nothing to do with management or the integrity of the company.

      Indeed, that is what a rogue management would say.

  2. Mikel

    The reality of the situation

    The people responsible for selling us modern devices are utterly innocent of systems security practice. But really good at building spif programs.

  3. Anonymous Coward
    Anonymous Coward

    Scary stuff

    The wireless LAN controller vulnerability is apparently exploited through the webauth feature, which is mostly used for guest access. So an external attacker can probably find somewhere comfortable to sit while they root the controller. This would usually be an "anchor" controller out on a DMZ, which limits some of the impact. However, there are likely to be some that use this function for internal access.

  4. Anonymous Coward
    Anonymous Coward

    hardly a late night

    Hardly a late night. Took about 15 mins to update software on all controllers. Set them off pre-downloading image to APs, scheduled reload of controllers for overnight. Came into work this morning checked controllers, all good with new code version. Biggest amount of time expended was waiting for software to download from cisco.com

    As we keep the software on our controllers up to date this is something which is done several times a year and isn't an extra ordinary task.

    1. AmenFromMars

      Re: hardly a late night

      Don't you test these things first?

      1. LB45
        Trollface

        Re: Testing? We've heard of it.

        Testing is for whimps. Cisco sez it's good to go, it's good to go.

        Just look at the original release software. Good to go.

        Wait. Hang on.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like