ID CVE-2012-4577
Summary The Linux firmware image on (1) Korenix Jetport 5600 series serial-device servers and (2) ORing Industrial DIN-Rail serial-device servers has a hardcoded password of "password" for the root account, which allows remote attackers to obtain administrative access via an SSH session.
References
Vulnerable Configurations
  • cpe:2.3:h:korenix:jetport:5601:*:*:*:*:*:*:*
    cpe:2.3:h:korenix:jetport:5601:*:*:*:*:*:*:*
  • cpe:2.3:h:korenix:jetport:5601f:*:*:*:*:*:*:*
    cpe:2.3:h:korenix:jetport:5601f:*:*:*:*:*:*:*
  • cpe:2.3:h:korenix:jetport:5604:*:*:*:*:*:*:*
    cpe:2.3:h:korenix:jetport:5604:*:*:*:*:*:*:*
  • cpe:2.3:h:korenix:jetport:5604i:*:*:*:*:*:*:*
    cpe:2.3:h:korenix:jetport:5604i:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 29-08-2017 - 01:32)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 55196
misc
xf jetport-default-password(77992)
Last major update 29-08-2017 - 01:32
Published 21-08-2012 - 18:55
Last modified 29-08-2017 - 01:32
Back to Top