CVE-2021-20146

An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:gryphonconnect:gryphon_tower_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:gryphonconnect:gryphon_tower:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:46

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2021-51 - Vendor Advisory () https://www.tenable.com/security/research/tra-2021-51 - Vendor Advisory

Information

Published : 2021-12-09 16:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20146

Mitre link : CVE-2021-20146

CVE.ORG link : CVE-2021-20146


JSON object : View

Products Affected

gryphonconnect

  • gryphon_tower
  • gryphon_tower_firmware
CWE
CWE-522

Insufficiently Protected Credentials