ID

VAR-200612-0416


CVE

CVE-2006-6718


TITLE

Allied Telesis AT-9000/24 Ethernet Vulnerability to execute unauthorized actions on the switch

Trust: 0.8

sources: JVNDB: JVNDB-2006-001794

DESCRIPTION

The Allied Telesis AT-9000/24 Ethernet switch has a default password for its admin account, "manager," which allows remote attackers to perform unauthorized actions. AT-9000/24 is prone to a cross-site request forgery vulnerability

Trust: 1.98

sources: NVD: CVE-2006-6718 // JVNDB: JVNDB-2006-001794 // BID: 87255 // VULHUB: VHN-22826

AFFECTED PRODUCTS

vendor:alliedtelesynmodel:at-9000 24 ethernetswitchscope:eqversion:*

Trust: 1.0

vendor:allied telesismodel:at-9000 24 ethernetswitchscope: - version: -

Trust: 0.8

vendor:alliedtelesynmodel:at-9000 24 ethernetswitchscope: - version: -

Trust: 0.6

vendor:allied telesismodel:at-9000/24scope:eqversion:0

Trust: 0.3

sources: BID: 87255 // JVNDB: JVNDB-2006-001794 // CNNVD: CNNVD-200612-507 // NVD: CVE-2006-6718

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6718
value: HIGH

Trust: 1.0

NVD: CVE-2006-6718
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200612-507
value: HIGH

Trust: 0.6

VULHUB: VHN-22826
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-6718
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-22826
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-22826 // JVNDB: JVNDB-2006-001794 // CNNVD: CNNVD-200612-507 // NVD: CVE-2006-6718

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-6718

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200612-507

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200612-507

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001794

PATCH

title:Top Pageurl:http://www.alliedtelesis.com/

Trust: 0.8

sources: JVNDB: JVNDB-2006-001794

EXTERNAL IDS

db:NVDid:CVE-2006-6718

Trust: 2.8

db:JVNDBid:JVNDB-2006-001794

Trust: 0.8

db:CNNVDid:CNNVD-200612-507

Trust: 0.7

db:BUGTRAQid:20061216 ALLIED TELESIS AT-9000/24 ETHERNET SWITCH MANAGEMENT CAN BE ACCESSED FROM ALL VLANS.

Trust: 0.6

db:BIDid:87255

Trust: 0.4

db:VULHUBid:VHN-22826

Trust: 0.1

sources: VULHUB: VHN-22826 // BID: 87255 // JVNDB: JVNDB-2006-001794 // CNNVD: CNNVD-200612-507 // NVD: CVE-2006-6718

REFERENCES

url:http://www.securityfocus.com/archive/1/454630/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/454630/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6718

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-6718

Trust: 0.8

sources: VULHUB: VHN-22826 // BID: 87255 // JVNDB: JVNDB-2006-001794 // CNNVD: CNNVD-200612-507 // NVD: CVE-2006-6718

CREDITS

Unknown

Trust: 0.3

sources: BID: 87255

SOURCES

db:VULHUBid:VHN-22826
db:BIDid:87255
db:JVNDBid:JVNDB-2006-001794
db:CNNVDid:CNNVD-200612-507
db:NVDid:CVE-2006-6718

LAST UPDATE DATE

2025-04-10T23:13:25.589000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-22826date:2018-10-17T00:00:00
db:BIDid:87255date:2006-12-23T00:00:00
db:JVNDBid:JVNDB-2006-001794date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200612-507date:2007-01-03T00:00:00
db:NVDid:CVE-2006-6718date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-22826date:2006-12-23T00:00:00
db:BIDid:87255date:2006-12-23T00:00:00
db:JVNDBid:JVNDB-2006-001794date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200612-507date:2006-12-23T00:00:00
db:NVDid:CVE-2006-6718date:2006-12-23T11:28:00