#VU16229 Use of hardcoded password (backdoor) in SDS 1202X-E
Published: December 4, 2018
Vulnerability identifier: #VU16229
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-259
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
SDS 1202X-E
SDS 1202X-E
Software vendor:
Siglent Technology
Siglent Technology
Description
The vulnerability allows a remote attacker to gain full access to the affected system.
The vulnerability exists due to the password hashes are hardcoded and are difficult to change because the “shadow” file is stored on a cramfs (intentionally write-only) file system. A remote unauthenticated attacker can connect as root to the oscilloscope via LAN when Telnet service is listening on port 23.
Remediation
Cybersecurity Help is currently unaware of any official solutions to address the vulnerability.