Critical severity9.8NVD Advisory· Published Apr 21, 2017· Updated May 13, 2026
CVE-2016-1560
CVE-2016-1560
Description
ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.
Affected products
8- cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- packetstormsecurity.com/files/136634/ExaGrid-Known-SSH-Key-Default-Password.htmlnvdExploitThird Party AdvisoryVDB Entry
- community.rapid7.com/community/infosec/blog/2016/04/07/r7-2016-04-exagrid-backdoor-ssh-keys-and-hardcoded-credentialsnvdExploitMitigationThird Party Advisory
- www.rapid7.com/db/modules/exploit/linux/ssh/exagrid_known_privkeynvdThird Party Advisory
News mentions
0No linked articles in our index yet.