CVE-2009-1745

Armorlogic Profense Web Application Firewall before 2.2.22, and 2.4.x before 2.4.4, has a default root password hash, and permits password-based root logins over SSH, which makes it easier for remote attackers to obtain access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:armorlogic:profense_web_application_firewall:*:*:*:*:*:*:*:*
cpe:2.3:a:armorlogic:profense_web_application_firewall:2.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://resources.enablesecurity.com/advisories/ES-20090500-profense.txt - () http://resources.enablesecurity.com/advisories/ES-20090500-profense.txt -
References () http://www.securityfocus.com/archive/1/503649/100/0/threaded - () http://www.securityfocus.com/archive/1/503649/100/0/threaded -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50852 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50852 -

Information

Published : 2009-05-21 15:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1745

Mitre link : CVE-2009-1745

CVE.ORG link : CVE-2009-1745


JSON object : View

Products Affected

armorlogic

  • profense_web_application_firewall
CWE
CWE-255

Credentials Management Errors