CVE-2015-0936

Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
References
Link Resource
http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2015/Apr/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/73696 Third Party Advisory VDB Entry
https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15 Third Party Advisory
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwjs47SGp47UAhVF5iYKHYGLDQkQFggoMAE&url=https%3A%2F%2Fwww.rapid7.com%2Fdb%2Fmodules%2Fexploit%2Flinux%2Fssh%2Fceragon_fibeair_known_privkey&usg=AFQjCNFZiZcWj47cpqPX-AbfpsW0DL4yYw Exploit Third Party Advisory
http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2015/Apr/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/73696 Third Party Advisory VDB Entry
https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15 Third Party Advisory
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwjs47SGp47UAhVF5iYKHYGLDQkQFggoMAE&url=https%3A%2F%2Fwww.rapid7.com%2Fdb%2Fmodules%2Fexploit%2Flinux%2Fssh%2Fceragon_fibeair_known_privkey&usg=AFQjCNFZiZcWj47cpqPX-AbfpsW0DL4yYw Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ceragon:fibeair_ip-10_firmware:-:*:*:*:*:*:*:*
OR cpe:2.3:h:ceragon:fibeair_ip-10c:-:*:*:*:*:*:*:*
cpe:2.3:h:ceragon:fibeair_ip-10e:-:*:*:*:*:*:*:*
cpe:2.3:h:ceragon:fibeair_ip-10g:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2015/Apr/3 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2015/Apr/3 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/73696 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/73696 - Third Party Advisory, VDB Entry
References () https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15 - Third Party Advisory () https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15 - Third Party Advisory
References () https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwjs47SGp47UAhVF5iYKHYGLDQkQFggoMAE&url=https%3A%2F%2Fwww.rapid7.com%2Fdb%2Fmodules%2Fexploit%2Flinux%2Fssh%2Fceragon_fibeair_known_privkey&usg=AFQjCNFZiZcWj47cpqPX-AbfpsW0DL4yYw - Exploit, Third Party Advisory () https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwjs47SGp47UAhVF5iYKHYGLDQkQFggoMAE&url=https%3A%2F%2Fwww.rapid7.com%2Fdb%2Fmodules%2Fexploit%2Flinux%2Fssh%2Fceragon_fibeair_known_privkey&usg=AFQjCNFZiZcWj47cpqPX-AbfpsW0DL4yYw - Exploit, Third Party Advisory

Information

Published : 2017-06-01 16:29

Updated : 2024-11-21 02:24


NVD link : CVE-2015-0936

Mitre link : CVE-2015-0936

CVE.ORG link : CVE-2015-0936


JSON object : View

Products Affected

ceragon

  • fibeair_ip-10_firmware
  • fibeair_ip-10g
  • fibeair_ip-10c
  • fibeair_ip-10e
CWE
CWE-320

Key Management Errors