An issue was discovered on the ENTTEC Datagate MK2, Storm 24, Pixelator, and E-Streamer MK2 with firmware 70044_update_05032019-482. They include a hard-coded SSH backdoor for remote SSH and SCP access as the root user. A command in the relocate and relocate_revB scripts copies the hardcoded key to the root user's authorized_keys file, enabling anyone with the associated private key to gain remote root access to all affected products.
References
Link | Resource |
---|---|
https://www.mogozobo.com/?p=3476 | Exploit Third Party Advisory |
https://www.mogozobo.com/?p=3476 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.mogozobo.com/?p=3476 - Exploit, Third Party Advisory |
Information
Published : 2019-06-07 16:29
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12776
Mitre link : CVE-2019-12776
CVE.ORG link : CVE-2019-12776
JSON object : View
Products Affected
enttec
- datagate_mk2
- datagate_mk2_firmware
- e-streamer_mk2
- storm_24_firmware
- pixelator
- pixelator_firmware
- storm_24
- e-streamer_mk2_firmware
CWE
CWE-798
Use of Hard-coded Credentials