Vulnerability Description
OpenNMS has a default password of rtc for the rtc account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opennms | Opennms | - |
Related Weaknesses (CWE)
References
- http://www.opennms.org/wiki/CVE-2015-0975Vendor Advisory
- http://www.rapid7.com/db/modules/auxiliary/gather/opennms_xxeExploit
- http://www.opennms.org/wiki/CVE-2015-0975Vendor Advisory
- http://www.rapid7.com/db/modules/auxiliary/gather/opennms_xxeExploit
FAQ
What is CVE-2015-7856?
CVE-2015-7856 is a vulnerability with a CVSS score of 10.0 (HIGH). OpenNMS has a default password of rtc for the rtc account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials.
How severe is CVE-2015-7856?
CVE-2015-7856 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7856?
Check the references section above for vendor advisories and patch information. Affected products include: Opennms Opennms.