ID CVE-2015-0936
Summary Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
References
Vulnerable Configurations
  • cpe:2.3:o:ceragon:fibeair_ip-10_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:ceragon:fibeair_ip-10_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ceragon:fibeair_ip-10c:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fibeair_ip-10c:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ceragon:fibeair_ip-10e:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fibeair_ip-10e:-:*:*:*:*:*:*:*
  • cpe:2.3:h:ceragon:fibeair_ip-10g:-:*:*:*:*:*:*:*
    cpe:2.3:h:ceragon:fibeair_ip-10g:-:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 17-06-2021 - 17:41)
Impact:
Exploitability:
CWE CWE-320
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 73696
fulldisc 20150401 Ceragon FibeAir IP-10 SSH Private Key Exposure (CVE-2015-0936)
misc
Last major update 17-06-2021 - 17:41
Published 01-06-2017 - 16:29
Last modified 17-06-2021 - 17:41
Back to Top