Описание
The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.
Ссылки
- Vendor Advisory
- US Government Resource
- US Government Resource
- Vendor Advisory
- Vendor Advisory
- US Government Resource
- US Government Resource
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0-1 (включая)Версия до 2.0-1 (включая)
Одно из
cpe:2.3:h:digital_alert_systems:dasdec_eas:*:*:*:*:*:*:*:*
cpe:2.3:h:digital_alert_systems:dasdec_eas:2.0-0:*:*:*:*:*:*:*
cpe:2.3:h:monroe_electronics:r189_one-net_eas:*:*:*:*:*:*:*:*
cpe:2.3:h:monroe_electronics:r189_one-net_eas:2.0-0:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.62938
Средний
10 Critical
CVSS2
Дефекты
CWE-310
Связанные уязвимости
github
почти 4 года назад
The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.
EPSS
Процентиль: 98%
0.62938
Средний
10 Critical
CVSS2
Дефекты
CWE-310