Critical severity9.8NVD Advisory· Published Jun 1, 2017· Updated May 13, 2026
CVE-2015-0936
CVE-2015-0936
Description
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key.
Affected products
1- cpe:2.3:o:ceragon:fibeair_ip-10_firmware:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.htmlnvdExploitThird Party AdvisoryVDB Entry
- www.google.com/urlnvdExploitThird Party Advisory
- packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.htmlnvdThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2015/Apr/3nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/73696nvdThird Party AdvisoryVDB Entry
- gist.github.com/todb-r7/5d86ecc8118f9eeecc15nvdThird Party Advisory
News mentions
0No linked articles in our index yet.