Vulnerabilites related to exagrid - ex32000e_firmware
cve-2016-1561
Vulnerability from cvelistv5
Published
2017-04-21 20:00
Modified
2024-08-05 23:02
Severity ?
EPSS score ?
Summary
ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:12.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-21T18:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "name": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials", "refsource": "MISC", "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "name": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-1561", "datePublished": "2017-04-21T20:00:00", "dateReserved": "2016-01-07T00:00:00", "dateUpdated": "2024-08-05T23:02:12.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1560
Vulnerability from cvelistv5
Published
2017-04-21 20:00
Modified
2024-08-05 23:02
Severity ?
EPSS score ?
Summary
ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:11.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-21T18:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "name": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials", "refsource": "MISC", "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "name": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-1560", "datePublished": "2017-04-21T20:00:00", "dateReserved": "2016-01-07T00:00:00", "dateUpdated": "2024-08-05T23:02:11.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2017-04-21 20:59
Modified
2024-11-21 02:46
Severity ?
Summary
ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html | Exploit, Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey | Third Party Advisory | |
cret@cert.org | https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials | Exploit, Mitigation, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
exagrid | ex3000_firmware | 4.8 | |
exagrid | ex3000 | - | |
exagrid | ex5000_firmware | 4.8 | |
exagrid | ex5000 | - | |
exagrid | ex7000_firmware | 4.8 | |
exagrid | ex7000 | - | |
exagrid | ex10000e_firmware | 4.8 | |
exagrid | ex10000e | - | |
exagrid | ex13000e_firmware | 4.8 | |
exagrid | ex13000e | - | |
exagrid | ex21000e_firmware | 4.8 | |
exagrid | ex21000e | - | |
exagrid | ex32000e_firmware | 4.8 | |
exagrid | ex32000e | - | |
exagrid | ex40000e_firmware | 4.8 | |
exagrid | ex40000e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB46D162-1FF2-40DE-B011-9D1B1236C1EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F21614-C509-4356-92AB-D928FA4B3244", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "0E374365-0452-4CC1-9C1C-A1A6A785D79E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7F69F5B-AEFF-4424-A2BE-D82D2196FB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "17F8EF90-AEAB-4D7F-BE60-E2FA72977B5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8854F063-DE4D-491B-A62A-315BF1570D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "16B91929-3E28-4CBD-9839-A8636F80F94C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex10000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21923E5-B1B7-4A5B-95FF-30606BF50F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "6AF64726-07AE-4C95-9ED7-FB0FDA7E65E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex13000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4ABEFC8-2E8E-4ED0-A9E2-ADC1C999EC4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B96C708C-CD6B-4DB1-A694-A05E3FF71EBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex21000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33895D0-CFC1-45FB-887F-2FFA4974C16C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "FDCA6DD1-E977-426D-85DD-606D0D7C3518", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex32000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBCECE29-B301-4028-8017-643A412495A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F932E-550F-4D6F-A948-9B037C7F301A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex40000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BDFB2D-173B-4B47-9422-7E5FF37B3D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image." }, { "lang": "es", "value": "Los dispositivos ExaGrid con el firmware anterior a 4.8 P26 tienen una clave p\u00fablica SSH por defecto en el archivo authorized_keys para root, lo que permite a atacantes remotos obtener acceso SSH aprovechando el conocimiento de una clave privada de otra instalaci\u00f3n o una imagen de firmware." } ], "id": "CVE-2016-1561", "lastModified": "2024-11-21T02:46:38.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-21T20:59:00.477", "references": [ { "source": "cret@cert.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-21 20:59
Modified
2024-11-21 02:46
Severity ?
Summary
ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html | Exploit, Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey | Third Party Advisory | |
cret@cert.org | https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials | Exploit, Mitigation, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
exagrid | ex3000_firmware | 4.8 | |
exagrid | ex3000 | - | |
exagrid | ex5000_firmware | 4.8 | |
exagrid | ex5000 | - | |
exagrid | ex7000_firmware | 4.8 | |
exagrid | ex7000 | - | |
exagrid | ex10000e_firmware | 4.8 | |
exagrid | ex10000e | - | |
exagrid | ex13000e_firmware | 4.8 | |
exagrid | ex13000e | - | |
exagrid | ex21000e_firmware | 4.8 | |
exagrid | ex21000e | - | |
exagrid | ex32000e_firmware | 4.8 | |
exagrid | ex32000e | - | |
exagrid | ex40000e_firmware | 4.8 | |
exagrid | ex40000e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB46D162-1FF2-40DE-B011-9D1B1236C1EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F21614-C509-4356-92AB-D928FA4B3244", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "0E374365-0452-4CC1-9C1C-A1A6A785D79E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7F69F5B-AEFF-4424-A2BE-D82D2196FB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "17F8EF90-AEAB-4D7F-BE60-E2FA72977B5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8854F063-DE4D-491B-A62A-315BF1570D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "16B91929-3E28-4CBD-9839-A8636F80F94C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex10000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21923E5-B1B7-4A5B-95FF-30606BF50F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "6AF64726-07AE-4C95-9ED7-FB0FDA7E65E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex13000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4ABEFC8-2E8E-4ED0-A9E2-ADC1C999EC4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B96C708C-CD6B-4DB1-A694-A05E3FF71EBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex21000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33895D0-CFC1-45FB-887F-2FFA4974C16C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "FDCA6DD1-E977-426D-85DD-606D0D7C3518", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex32000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBCECE29-B301-4028-8017-643A412495A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F932E-550F-4D6F-A948-9B037C7F301A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:exagrid:ex40000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BDFB2D-173B-4B47-9422-7E5FF37B3D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session." }, { "lang": "es", "value": "Los dispositivos ExaGrid con un firmware anterior a 4.8 P26 tienen una contrase\u00f1a por defecto de (1) inflexi\u00f3n para la cuenta de root shell y (2) soporte para la cuenta de soporte en la interfaz web, lo que permite a atacantes remotos obtener acceso administrativo a trav\u00e9s de una sesi\u00f3n SSH o HTTP." } ], "id": "CVE-2016-1560", "lastModified": "2024-11-21T02:46:38.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-21T20:59:00.447", "references": [ { "source": "cret@cert.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }