Description: | Summary: It was possible to login into the remote SSH server using default credentials.
Vulnerability Insight: As the VT 'SSH Brute Force Logins With Default Credentials' (OID: 1.3.6.1.4.1.25623.1.0.108013) might run into a timeout the actual reporting of this vulnerability takes place in this VT instead.
Vulnerability Impact: This issue may be exploited by a remote attacker to e.g. gain access to sensitive information or modify system configuration.
Affected Software/OS: The following products are known to use the default credentials checked by the VT 'SSH Brute Force Logins With Default Credentials' (OID: 1.3.6.1.4.1.25623.1.0.108013) used for this reporting:
- CVE-2017-16523: MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices
- CVE-2020-29583: Zyxel Firewall / AP Controller
- CVE-2020-9473: S. Siedle & Soehne SG 150-0 Smart Gateway before 1.2.4
- CVE-2023-1944: minikube 1.29.0 and probably prior
- CVE-2024-22902: Vinchin Backup & Recovery
- CVE-2024-31970: AdTran SRG 834-5 HDC17600021F1 devices (with SmartOS 11.1.1.1) during a window of time when the device is being set up
- CVE-2024-46328: VONETS VAP11G-300 v3.3.23.6.9
- Various additional products like e.g. Ubiquiti EdgeMax / EdgeRouter, Crestron AM-100 and similar for which no CVE was assigned (See 'default_credentials.inc' file on the file system for a full list)
Other products might be affected as well.
Solution: Change the password as soon as possible.
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|