Vulnerabilities (CVE)

Filtered by vendor Riverbed Subscribe
Filtered by product Rios
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-7307 1 Riverbed 1 Rios 2024-11-21 7.2 HIGH 6.8 MEDIUM
Riverbed RiOS before 9.0.1 does not properly restrict shell access in single-user mode, which makes it easier for physically proximate attackers to obtain root privileges and access decrypted data by replacing the /opt/tms/bin/cli file.
CVE-2017-7306 1 Riverbed 1 Rios 2024-11-21 1.9 LOW 6.4 MEDIUM
Riverbed RiOS through 9.6.0 has a weak default password for the secure vault, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism by leveraging knowledge of the password algorithm and the appliance serial number. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for supporting arbitrary password changes by customers; however, a password change is optional to meet different customers' needs
CVE-2017-7305 1 Riverbed 1 Rios 2024-11-21 2.1 LOW 4.6 MEDIUM
Riverbed RiOS through 9.6.0 does not require a bootloader password, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism via a crafted boot. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for a bootloader password; however, this password is optional to meet different customers' needs
CVE-2017-5670 1 Riverbed 1 Rios 2024-11-21 2.1 LOW 4.6 MEDIUM
Riverbed RiOS through 9.6.0 deletes the secure vault with the rm program (not shred or srm), which makes it easier for physically proximate attackers to obtain sensitive information by reading raw disk blocks.