Vulnerability Note VU#544527
OpenELEC and RasPlex have a hard-coded SSH root password
Overview
OpenELEC and derivatives utilize a hard-coded default root password, and enable SSH root access by default.
Description
CWE-259: Use of Hard-coded Password OpenELEC has a hard-coded root password. The root partition is by default read-only, preventing a user from changing the password once installed; furthermore, SSH access is enabled by default. |
Impact
A remote attacker may gain root access to the device. |
Solution
The CERT/CC is currently unaware of a full solution to this issue. Affected users may consider the following mitigations: |
Vendor Information (Learn More)
| Vendor | Status | Date Notified | Date Updated |
|---|---|---|---|
| OpenELEC | Affected | - | 29 Jan 2016 |
| RasPlex | Affected | - | 29 Jan 2016 |
CVSS Metrics (Learn More)
| Group | Score | Vector |
|---|---|---|
| Base | 10.0 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| Temporal | 8.5 | E:POC/RL:U/RC:UR |
| Environmental | 2.1 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
- http://wiki.openelec.tv/index.php?title=OpenELEC_FAQ#SSH_Password_change
- http://wiki.openelec.tv/index.php?title=Config_connect_ssh_wo_password
- http://wiki.openelec.tv/index.php?title=Compile_from_source
- https://github.com/RasPlex/RasPlex/issues/453
Credit
Thanks to Aidan Samuel for reporting this vulnerability.
This document was written by Garret Wassermann.
Other Information
- CVE IDs: Unknown
- Date Public: 02 Feb 2016
- Date First Published: 02 Feb 2016
- Date Last Updated: 02 Feb 2016
- Document Revision: 24
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.