vendor:
RIOS
by:
Marek Kroemeke
7.5
CVSS
HIGH
Hardcoded Credentials
798
CWE
Product Name: RIOS
Affected Version From: RIOS 4.6.6
Affected Version To: RIOS 4.7.0
Patch Exists: NO
Related CWE: None
CPE: a:riorey:rios
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
Riorey DDoS Mitigation Appliances Vulnerability
Riorey devices running affected "RIOS" versions have a hardcoded username and password that is then used by the RView software to connect on port 8022 in order to create a SSH tunnel. This allows the attacker to login as user 'dbuser' using the hardcoded password, and due to an old Linux kernel version used - escalate privilages through several vulnerabilities and eventually take the full control over the device.
Mitigation:
The web interface should advise the user to reset the admin password for security reasons and the RView application should not use the hardcoded password in order to create the SSH tunnel.