CVE-2015-2907

Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, have hardcoded SSH credentials, which makes it easier for remote attackers to obtain access by leveraging knowledge of the required username and password.
Configurations

Configuration 1 (hide)

cpe:2.3:o:mobile_devices:c4_obd-ii_dongle_firmware:*:*:*:*:*:*:*:*

History

01 Mar 2023, 08:15

Type Values Removed Values Added
References
  • {'url': 'http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX', 'name': 'http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX', 'tags': ['Third Party Advisory', 'US Government Resource'], 'refsource': 'CONFIRM'}
Summary ** DISPUTED ** Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, have hardcoded SSH credentials, which makes it easier for remote attackers to obtain access by leveraging knowledge of the required username and password. NOTE: the vendor states "This was a flaw for the developer/debugging devices (again not possible in production versions)." Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, have hardcoded SSH credentials, which makes it easier for remote attackers to obtain access by leveraging knowledge of the required username and password.

Information

Published : 2015-08-23 21:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-2907

Mitre link : CVE-2015-2907

CVE.ORG link : CVE-2015-2907


JSON object : View

Products Affected

mobile_devices

  • c4_obd-ii_dongle_firmware