Описание
eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allow local users to gain privileges by pressing CTRL-SHIFT-ALT-DEL and entering the "maertsJ" password, which is hard-coded into lshell.
Ссылки
- Exploit
- Exploit
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:esesix:thintune_extreme:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_l:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_m:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_mobile:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_s:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_xm:2.4.38:*:*:*:*:*:*:*
cpe:2.3:h:esesix:thintune_xs:2.4.38:*:*:*:*:*:*:*
EPSS
Процентиль: 31%
0.00121
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allow local users to gain privileges by pressing CTRL-SHIFT-ALT-DEL and entering the "maertsJ" password, which is hard-coded into lshell.
EPSS
Процентиль: 31%
0.00121
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other