5
CVSSv2

CVE-2016-1561

Published: 21/04/2017 Updated: 27/04/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

ExaGrid appliances with firmware prior to 4.8 P26 have a default SSH public key in the authorized_keys file for root, which allows remote malicious users to obtain SSH access by leveraging knowledge of a private key from another installation or a firmware image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exagrid ex3000_firmware 4.8

exagrid ex5000_firmware 4.8

exagrid ex7000_firmware 4.8

exagrid ex10000e_firmware 4.8

exagrid ex13000e_firmware 4.8

exagrid ex21000e_firmware 4.8

exagrid ex32000e_firmware 4.8

exagrid ex40000e_firmware 4.8

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'net/ssh' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Auxiliary::Report include Msf::Exploit::Remote::SSH def initialize(info = {}) ...