Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB46D162-1FF2-40DE-B011-9D1B1236C1EC", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F21614-C509-4356-92AB-D928FA4B3244", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "0E374365-0452-4CC1-9C1C-A1A6A785D79E", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7F69F5B-AEFF-4424-A2BE-D82D2196FB73", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "17F8EF90-AEAB-4D7F-BE60-E2FA72977B5E", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8854F063-DE4D-491B-A62A-315BF1570D14", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "16B91929-3E28-4CBD-9839-A8636F80F94C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex10000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D21923E5-B1B7-4A5B-95FF-30606BF50F8D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "6AF64726-07AE-4C95-9ED7-FB0FDA7E65E9", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex13000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4ABEFC8-2E8E-4ED0-A9E2-ADC1C999EC4D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B96C708C-CD6B-4DB1-A694-A05E3FF71EBA", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex21000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33895D0-CFC1-45FB-887F-2FFA4974C16C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "FDCA6DD1-E977-426D-85DD-606D0D7C3518", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex32000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBCECE29-B301-4028-8017-643A412495A6", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F932E-550F-4D6F-A948-9B037C7F301A", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:exagrid:ex40000e:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BDFB2D-173B-4B47-9422-7E5FF37B3D04", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session."}, {"lang": "es", "value": "Los dispositivos ExaGrid con un firmware anterior a 4.8 P26 tienen una contrase\u00f1a por defecto de (1) inflexi\u00f3n para la cuenta de root shell y (2) soporte para la cuenta de soporte en la interfaz web, lo que permite a atacantes remotos obtener acceso administrativo a trav\u00e9s de una sesi\u00f3n SSH o HTTP."}], "id": "CVE-2016-1560", "lastModified": "2024-11-21T02:46:38.407", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-04-21T20:59:00.447", "references": [{"source": "cret@cert.org", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html"}, {"source": "cret@cert.org", "tags": ["Third Party Advisory"], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey"}, {"source": "cret@cert.org", "tags": ["Exploit", "Mitigation", "Third Party Advisory"], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Mitigation", "Third Party Advisory"], "url": "https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials"}], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-798"}], "source": "nvd@nist.gov", "type": "Primary"}]}