CVE-2019-17584

The Meinberg SyncBox/PTP/PTPv2 devices have default SSH keys which allow attackers to get root access to the devices. All firmware versions up to v5.34o, v5.34s, v5.32* or 5.34g are affected. The private key is also used in an internal interface of another Meinberg Device and can be extracted from a firmware update of this device. An update to fix the vulnerability was published by the vendor.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () https://w1n73r.de/CVE/2019/17584/ - Third Party Advisory () https://w1n73r.de/CVE/2019/17584/ - Third Party Advisory
References () https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-1904-syncbox-ptp-ptpv2.htm - Vendor Advisory () https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-1904-syncbox-ptp-ptpv2.htm - Vendor Advisory

Information

Published : 2020-01-21 20:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-17584

Mitre link : CVE-2019-17584

CVE.ORG link : CVE-2019-17584


JSON object : View

Products Affected

meinbergglobal

  • syncbox\/ptpv2
  • syncbox\/ptpv2_firmware