Vulnerabilities > CVE-2015-0936 - Key Management Errors vulnerability in Ceragon Fibeair Ip-10 Firmware

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ceragon
CWE-320
exploit available
metasploit

Summary

Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.

Vulnerable Configurations

Part Description Count
OS
Ceragon
1
Hardware
Ceragon
3

Common Weakness Enumeration (CWE)

Exploit-Db

idEDB-ID:41679
last seen2018-11-30
modified2015-04-01
published2015-04-01
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/41679
titleCeragon FibeAir IP-10 - SSH Private Key Exposure (Metasploit)

Metasploit

descriptionCeragon ships a public/private key pair on FibeAir IP-10 devices that allows passwordless authentication to any other IP-10 device. Since the key is easily retrievable, an attacker can use it to gain unauthorized remote access as the "mateidu" user.
idMSF:EXPLOIT/LINUX/SSH/CERAGON_FIBEAIR_KNOWN_PRIVKEY
last seen2020-06-13
modified2018-08-16
published2015-04-01
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/ssh/ceragon_fibeair_known_privkey.rb
titleCeragon FibeAir IP-10 SSH Private Key Exposure

Packetstorm