Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rcv8-vxjp-vqcw

Опубликовано: 21 мая 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

An OpenSSH daemon listens on TCP port 22. There is a hard-coded entry in the "/etc/shadow" file in the firmware image for the "root" user. However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.

An OpenSSH daemon listens on TCP port 22. There is a hard-coded entry in the "/etc/shadow" file in the firmware image for the "root" user. However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.

EPSS

Процентиль: 25%
0.00084
Низкий

8.1 High

CVSS3

Дефекты

CWE-912

Связанные уязвимости

CVSS3: 8.1
nvd
9 месяцев назад

An OpenSSH daemon listens on TCP port 22. There is a hard-coded entry in the "/etc/shadow" file in the firmware image for the "root" user. However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.

EPSS

Процентиль: 25%
0.00084
Низкий

8.1 High

CVSS3

Дефекты

CWE-912