-
Moderator
Reputation: 153
Radio Vulnerabilities Ceragon, Dragonwave etc
Last edited by simog72; 2017-08-09 at 10:21 PM
**** COMMODORE 64 BASIC V2 ****
64K RAM SYSTEM 38911 BASIC BYTES FREE
READY.
-
2017-05-22 09:36 PM
# ADS
Circuit advertisement
-
Member
Reputation: 278
Re: Radio Vulnerabilities Ceragon, Dragonwave etc
This is not the only backdoor access to IP10, there's a better one.
I also know there's a backdoor to NEC radios, but I never got it.
-
VIP Member
Reputation: 1852
Re: Radio Vulnerabilities Ceragon, Dragonwave etc
yea,
my Ceragon ip20 series has root and snmp backdoors too,
and DragonWave allow root, and i think NEC ipasso too(forgot).
but many operator equipments has root/root and admin/admin accounts,
so it's OK, in any case we used firewall/VPN/DMZ/VLAN/etc for our equipment.
it's not problem.
-
Member
Reputation: 261
Re: Radio Vulnerabilities Ceragon, Dragonwave etc
And usually network elements and MNG interfaces are operated within a private IP network so access from outside is anyway quite challenging
-
Junior Member
Reputation: 10
Re: Radio Vulnerabilities Ceragon, Dragonwave etc
how to do it with private ip network?
-
Member
Reputation: 278
-
VIP Member
Reputation: 1852
Re: Radio Vulnerabilities Ceragon, Dragonwave etc
russian hackers used incremental Fail2ban at our ubuntu/unix servers/desktop.
or 16+ chars password. no root/root ))))
https://habrahabr.ru/post/238303/
Originally Posted by
byja
Did you change at least the default user/pass on the firewall itself?
People, be serious about this. Admin/admin on your MW IDU is how russian hackers do things like changing your default AC temperature to electing Trump as US president.
Bookmarks