RSS   Vulnerabilities for 'RIOS'   RSS

2017-04-04
 
CVE-2017-7307

CWE-732
 

 
Riverbed RiOS before 9.0.1 does not properly restrict shell access in single-user mode, which makes it easier for physically proximate attackers to obtain root privileges and access decrypted data by replacing the /opt/tms/bin/cli file.

 
 
CVE-2017-7306

CWE-521
 

 
** DISPUTED ** Riverbed RiOS through 9.6.0 has a weak default password for the secure vault, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism by leveraging knowledge of the password algorithm and the appliance serial number. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for supporting arbitrary password changes by customers; however, a password change is optional to meet different customers' needs.

 
 
CVE-2017-7305

CWE-521
 

 
** DISPUTED ** Riverbed RiOS through 9.6.0 does not require a bootloader password, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism via a crafted boot. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for a bootloader password; however, this password is optional to meet different customers' needs.

 
 
CVE-2017-5670

 

 
Riverbed RiOS through 9.6.0 deletes the secure vault with the rm program (not shred or srm), which makes it easier for physically proximate attackers to obtain sensitive information by reading raw disk blocks.

 

 >>> Vendor: Riverbed 4 Products
RIOS
Steelapp traffic manager
Opnet app response xpert
Steelcentral appinternals dynamic sampling agent


Copyright 2024, cxsecurity.com

 

Back to Top