CVE-2021-20146

An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:gryphonconnect:gryphon_tower_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:gryphonconnect:gryphon_tower:-:*:*:*:*:*:*:*

History

13 Dec 2021, 18:20

Type Values Removed Values Added
CPE cpe:2.3:h:gryphonconnect:gryphon_tower:-:*:*:*:*:*:*:*
cpe:2.3:o:gryphonconnect:gryphon_tower_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8
CWE CWE-522
References (MISC) https://www.tenable.com/security/research/tra-2021-51 - (MISC) https://www.tenable.com/security/research/tra-2021-51 - Vendor Advisory

09 Dec 2021, 16:38

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-09 16:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-20146

Mitre link : CVE-2021-20146

CVE.ORG link : CVE-2021-20146


JSON object : View

Products Affected

gryphonconnect

  • gryphon_tower
  • gryphon_tower_firmware
CWE
CWE-522

Insufficiently Protected Credentials