The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14115
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14115
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
152 | CVE-2017-0075 | 관리자 | 2017.03.18 | 146 |
151 | CVE-2017-0043 | 관리자 | 2017.03.18 | 146 |
150 | CVE-2017-14094 | 관리자 | 2018.01.25 | 145 |
149 | CVE-2017-14122 | 관리자 | 2017.09.04 | 145 |
148 | CVE-2017-9644 | 관리자 | 2017.08.27 | 145 |
147 | CVE-2017-13648 (graphicsmagick) | 관리자 | 2017.08.27 | 145 |
146 | CVE-2017-0083 | 관리자 | 2017.03.18 | 145 |
145 | CVE-2017-0026 | 관리자 | 2017.03.18 | 145 |
144 | CVE-2017-6558 | 관리자 | 2017.03.10 | 145 |
143 | CVE-2017-2884 | 관리자 | 2017.11.09 | 144 |
142 | CVE-2017-16001 | 관리자 | 2017.11.09 | 143 |
141 | CVE-2017-16548 | 관리자 | 2017.11.09 | 143 |
140 | CVE-2017-0091 | 관리자 | 2017.03.18 | 143 |
139 | CVE-2017-6549 | 관리자 | 2017.03.10 | 143 |
138 | CVE-2018-1045 | 관리자 | 2018.01.25 | 142 |