Vulnerability CVE-2016-1561


Published: 2017-04-21

Description:
ExaGrid appliances with firmware before 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote attackers to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image.

See advisories in our WLB2 database:
Topic
Author
Date
Low
ExaGrid Known SSH Key / Default Password
egypt
10.04.2016

Vendor: Exagrid
Product: Ex3000 firmware 
Version: 4.8;
Product: Ex40000e firmware 
Version: 4.8;
Product: Ex21000e firmware 
Version: 4.8;
Product: Ex10000e firmware 
Version: 4.8;
Product: Ex13000e firmware 
Version: 4.8;
Product: Ex5000 firmware 
Version: 4.8;
Product: Ex32000e firmware 
Version: 4.8;
Product: Ex7000 firmware 
Version: 4.8;

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None

 References:
http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html
http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey
https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials

Copyright 2019, cxsecurity.com

 

Back to Top