An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2021-51 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
13 Dec 2021, 18:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:gryphonconnect:gryphon_tower:-:*:*:*:*:*:*:* cpe:2.3:o:gryphonconnect:gryphon_tower_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CWE | CWE-522 | |
References | (MISC) https://www.tenable.com/security/research/tra-2021-51 - Vendor Advisory |
09 Dec 2021, 16:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-09 16:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-20146
Mitre link : CVE-2021-20146
CVE.ORG link : CVE-2021-20146
JSON object : View
Products Affected
gryphonconnect
- gryphon_tower
- gryphon_tower_firmware
CWE
CWE-522
Insufficiently Protected Credentials