CVE-2006-3291

N/A Unknown
Published: June 28, 2006 Modified: April 16, 2026
View on NVD

Description

The web interface on Cisco IOS 12.3(8)JA and 12.3(8)JA1, as used on the Cisco Wireless Access Point and Wireless Bridge, reconfigures itself when it is changed to use the "Local User List Only (Individual Passwords)" setting, which removes all security and password configurations and allows remote attackers to access the system.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/544484
Source: cve@mitre.org
US Government Resource
http://www.osvdb.org/26878
Source: cve@mitre.org
http://secunia.com/advisories/20860
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016399
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.cisco.com/warp/public/707/cisco-sa-20060628-ap.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.kb.cert.org/vuls/id/544484
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.osvdb.org/26878
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18704
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2584
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27437
Source: af854a3a-2127-422b-91ae-364da2661108

16 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.1%
78th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

cisco