ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html | Exploit Third Party Advisory VDB Entry |
http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey | Third Party Advisory |
https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2017-04-21 20:59
Updated : 2024-02-28 15:44
NVD link : CVE-2016-1560
Mitre link : CVE-2016-1560
CVE.ORG link : CVE-2016-1560
JSON object : View
Products Affected
exagrid
- ex10000e
- ex5000_firmware
- ex40000e_firmware
- ex7000_firmware
- ex3000
- ex7000
- ex13000e
- ex32000e
- ex13000e_firmware
- ex40000e
- ex10000e_firmware
- ex5000
- ex32000e_firmware
- ex3000_firmware
- ex21000e_firmware
- ex21000e
CWE
CWE-798
Use of Hard-coded Credentials