Description
Riverbed RiOS through 9.6.0 does not require a bootloader password, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism via a crafted boot. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for a bootloader password; however, this password is optional to meet different customers' needs
Published: 2017-04-04
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T15:56:36.396Z

Reserved: 2017-03-29T00:00:00.000Z

Link: CVE-2017-7305

cve-icon Vulnrichment

Updated: 2024-08-05T15:56:36.396Z

cve-icon NVD

Status : Deferred

Published: 2017-04-04T16:59:00.237

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-7305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses