ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html | Exploit Third Party Advisory VDB Entry |
http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey | Third Party Advisory |
https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2017-04-21 20:59
Updated : 2024-02-28 15:44
NVD link : CVE-2016-1561
Mitre link : CVE-2016-1561
CVE.ORG link : CVE-2016-1561
JSON object : View
Products Affected
exagrid
- ex10000e
- ex5000_firmware
- ex40000e_firmware
- ex7000_firmware
- ex3000
- ex7000
- ex13000e
- ex32000e
- ex13000e_firmware
- ex40000e
- ex10000e_firmware
- ex5000
- ex32000e_firmware
- ex3000_firmware
- ex21000e_firmware
- ex21000e
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor