ID CVE-2016-2230
Type cve
Reporter NVD
Modified 2016-02-25T07:43:50
Description
OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session.
{"bulletinFamily": "NVD", "edition": 1, "published": "2016-02-08T11:59:11", "id": "CVE-2016-2230", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2230", "description": "OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session.", "cpe": ["cpe:/o:openelec:openelec"], "title": "CVE-2016-2230", "assessment": {"system": "", "href": "", "name": ""}, "reporter": "NVD", "viewCount": 0, "cvelist": ["CVE-2016-2230"], "hash": "d1e561515b9e83ad30ab6895b27a8ad8197a4e5444469cd7f68f5be4b604ad40", "scanner": [], "hashmap": [{"key": "assessment", "hash": "56344447e7ac984a9daba5b3411b55af"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "478b606fa220a18732a0dca979eb555e"}, {"key": "cvelist", "hash": "4a995068451b8526bd98717a68aa5db7"}, {"key": "cvss", "hash": "aff19e7d2f5800fbf65dc3d944df032a"}, {"key": "description", "hash": "03e36f418a05e5428ede55b2ed0a9531"}, {"key": "href", "hash": "832455c7e175acce5a8651e6b2f975f9"}, {"key": "modified", "hash": "ca90d1b2bcc4c2863716d5e47bff2e8a"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "ce2ee3aefb686cc6b9da68c5f7645c08"}, {"key": "references", "hash": "eb32190344b102ed34384eb8fdb4047b"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "8880dbb2599254ac533db56afae89fd4"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}, {"key": "viewCount", "hash": "cfcd208495d565ef66e7dff9f98764da"}], "objectVersion": "1.2", "modified": "2016-02-25T07:43:50", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "type": "cve", "history": [], "references": ["http://www.kb.cert.org/vuls/id/544527", "https://github.com/RasPlex/RasPlex/issues/453"], "lastseen": "2016-09-26T17:42:10", "enchantments": {"vulnersScore": 6.1}}
{"result": {"openvas": [{"id": "OPENVAS:1361412562310807608", "type": "openvas", "title": "OpenELEC Authentication Bypass Vulnerability", "description": "This host is installed with OpenELEC device\n and is prone authentication bypass vulnerability.", "published": "2016-03-11T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807608", "cvelist": ["CVE-2016-2230"], "lastseen": "2017-07-02T21:13:20"}, {"id": "OPENVAS:1361412562310807609", "type": "openvas", "title": "Rasplex Authentication Bypass Vulnerability", "description": "This host is installed with Rasplex device and\n is prone authentication bypass vulnerability.", "published": "2016-03-11T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807609", "cvelist": ["CVE-2016-2230"], "lastseen": "2017-07-02T21:13:18"}]}}