![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.804414 |
Category: | Gain a shell remotely |
Title: | Quantum DXi Remote 'root' Authentication Bypass Vulnerability |
Summary: | Quantum DXi is prone to an authentication bypass vulnerability. |
Description: | Summary: Quantum DXi is prone to an authentication bypass vulnerability. Vulnerability Insight: - The root user has a hardcoded password that is unknown and not changeable. Normally access is only through the restricted shells. - The /root/.ssh/authorized_keys on the appliance contains the static private ssh key. Using this key on a remote system to login through SSH will give a root shell. Vulnerability Impact: Successful exploitation will allow attacker to gain unauthorized root access to affected devices and completely compromise the devices. Affected Software/OS: Quantum DXi V1000 2.2.1 and below. Solution: Upgrade to Quantum DXi V1000 2.3.0.1 or later. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N |
Copyright | Copyright (C) 2014 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |