ceragon security advisories
2 threat alerts tracking vulnerabilities and security advisories that affect ceragon products.
Vulnios monitors ceragon CVE feeds, vendor advisories, CISA KEV listings, and exploit-prediction data continuously. Each alert below is enriched with severity, exploitation status, affected products, and a remediation path. Use this page to scan recent ceragon security news in one place, or click into an individual alert for full detail.
Critical Vulnerability: CVE-2015-0936 — ceragon — fibeair_ip-10_firmware, fibeair_ip-10c
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
criticalCVE-2015-0936Critical Vulnerability: CVE-2016-10309 — ceragon — fibeair_ip-10_firmware, fibeair_ip-10
In the GUI of Ceragon FibeAir IP-10 (before 7.2.0) devices, a remote attacker can bypass authentication by adding an ALBATROSS cookie with the value 0-4-11 to their browser.
criticalCVE-2016-10309
Track ceragon exposure across your environment
Vulnios automatically cross-references your asset inventory against new ceragon CVEs and surfaces only what affects you. No more sifting manually — actionable findings only.
Start a free scan