Description
Riverbed RiOS through 9.6.0 has a weak default password for the secure vault, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism by leveraging knowledge of the password algorithm and the appliance serial number. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for supporting arbitrary password changes by customers; however, a password change is optional to meet different customers' needs
Published: 2017-04-04
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T15:56:36.420Z

Reserved: 2017-03-29T00:00:00.000Z

Link: CVE-2017-7306

cve-icon Vulnrichment

Updated: 2024-08-05T15:56:36.420Z

cve-icon NVD

Status : Deferred

Published: 2017-04-04T16:59:00.283

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-7306

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses