ID CVE-2013-6838
Summary An unspecified Enghouse Interactive Professional Services "addon product" in Enghouse Interactive IVR Pro (VIP2000) 9.0.3 (rel903), when using OpenVZ and fallback customization, uses the same SSH private key across different customers' installations, which allows remote attackers to gain privileges by leveraging knowledge of this key.
References
Vulnerable Configurations
  • cpe:2.3:a:enghouseinteractive:ivr_pro:9.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:enghouseinteractive:ivr_pro:9.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:openvz:vzkernel:-:*:*:*:*:*:*:*
    cpe:2.3:o:openvz:vzkernel:-:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 31-01-2014 - 06:07)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
fulldisc 20140114 [CVE-2013-6838] Enghouse Interactive IVR Pro (VIP2000) remote root authentication bypass Vulnerability
misc https://xpd.se/advisories/XPD-2013-001.txt
Last major update 31-01-2014 - 06:07
Published 28-01-2014 - 00:55
Last modified 31-01-2014 - 06:07
Back to Top