CVE-2016-2230

Published on: 02/08/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Openelec from Openelec contain the following vulnerability:

OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session.

  • CVE-2016-2230 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Vulnerability Note VU#544527 - OpenELEC and RasPlex have a hard-coded SSH root password Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#544527
SSH insecure by default · Issue #453 · RasPlex/RasPlex · GitHub github.com
text/html
URL Logo MISC github.com/RasPlex/RasPlex/issues/453

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
OpenelecOpenelecAllAllAllAll
Operating
System
OpenelecOpenelecAllAllAllAll
  • cpe:2.3:o:openelec:openelec:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:openelec:openelec:*:*:*:*:*:*:*:*: