Vulnerability Description
RioRey RIOS 4.6.6 and 4.7.0 uses an undocumented, hard-coded username (dbadmin) and password (sq!us3r) for an SSH tunnel, which allows remote attackers to gain privileges via port 8022.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Riorey | Rios | 4.6.6 |
Related Weaknesses (CWE)
References
- http://osvdb.org/58858
- http://packetstormsecurity.org/0910-exploits/riorey-passwd.txtExploit
- http://secunia.com/advisories/36971Vendor Advisory
- http://osvdb.org/58858
- http://packetstormsecurity.org/0910-exploits/riorey-passwd.txtExploit
- http://secunia.com/advisories/36971Vendor Advisory
FAQ
What is CVE-2009-3710?
CVE-2009-3710 is a vulnerability with a CVSS score of 10.0 (HIGH). RioRey RIOS 4.6.6 and 4.7.0 uses an undocumented, hard-coded username (dbadmin) and password (sq!us3r) for an SSH tunnel, which allows remote attackers to gain privileges via port 8022.
How severe is CVE-2009-3710?
CVE-2009-3710 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-3710?
Check the references section above for vendor advisories and patch information. Affected products include: Riorey Rios.