Vulnerability Details : CVE-2016-1560
Public exploit exists!
ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.
Products affected by CVE-2016-1560
- cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1560
1.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2016-1560
-
ExaGrid Known SSH Key and Default Password
Disclosure Date: 2016-04-07First seen: 2020-04-26exploit/linux/ssh/exagrid_known_privkeyExaGrid ships a public/private key pair on their backup appliances to allow passwordless authentication to other ExaGrid appliances. Since the private key is easily retrievable, an attacker can use it to gain unauthorized remote access as root. Addit
CVSS scores for CVE-2016-1560
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-1560
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1560
-
https://community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentials
R7-2016-04: Exagrid Backdoor SSH Keys and Hardcoded Credentials (CVE-2016-1560, CVE-2016-1561)Exploit;Mitigation;Third Party Advisory
-
http://www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkey
ExaGrid Known SSH Key and Default PasswordThird Party Advisory
-
http://packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.html
ExaGrid Known SSH Key / Default Password ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to