An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2021-51 | Vendor Advisory |
https://www.tenable.com/security/research/tra-2021-51 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2021-51 - Vendor Advisory |
Information
Published : 2021-12-09 16:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20146
Mitre link : CVE-2021-20146
CVE.ORG link : CVE-2021-20146
JSON object : View
Products Affected
gryphonconnect
- gryphon_tower
- gryphon_tower_firmware
CWE
CWE-522
Insufficiently Protected Credentials