Описание
An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 04.0004.12 (включая)
Одновременно
cpe:2.3:o:gryphonconnect:gryphon_tower_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:gryphonconnect:gryphon_tower:-:*:*:*:*:*:*:*
EPSS
Процентиль: 81%
0.01493
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-522
Связанные уязвимости
github
около 4 лет назад
An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.
EPSS
Процентиль: 81%
0.01493
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-522