CVE-2014-3419

Infoblox NetMRI before 6.8.5 has a default password of admin for the "root" MySQL database account, which makes it easier for local users to obtain access via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:infoblox:netmri:*:*:*:*:*:*:*:*
cpe:2.3:a:infoblox:netmri:6.0.2.42:*:*:*:*:*:*:*
cpe:2.3:a:infoblox:netmri:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:infoblox:netmri:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:infoblox:netmri:6.2.1.48:*:*:*:*:*:*:*
cpe:2.3:a:infoblox:netmri:6.8.2.11:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html - Exploit () http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html - Exploit
References () http://packetstormsecurity.com/files/127410/Infoblox-6.8.4.x-Weak-MySQL-Password.html - Exploit () http://packetstormsecurity.com/files/127410/Infoblox-6.8.4.x-Weak-MySQL-Password.html - Exploit
References () http://www.securityfocus.com/archive/1/532710/100/0/threaded - () http://www.securityfocus.com/archive/1/532710/100/0/threaded -
References () http://www.securityfocus.com/bid/68473 - () http://www.securityfocus.com/bid/68473 -
References () http://www.securitytracker.com/id/1030542 - () http://www.securitytracker.com/id/1030542 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/94450 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/94450 -
References () https://github.com/depthsecurity/NetMRI-2014-3418 - () https://github.com/depthsecurity/NetMRI-2014-3418 -

Information

Published : 2014-07-15 14:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3419

Mitre link : CVE-2014-3419

CVE.ORG link : CVE-2014-3419


JSON object : View

Products Affected

infoblox

  • netmri
CWE
CWE-255

Credentials Management Errors