CVE-2019-17584

The Meinberg SyncBox/PTP/PTPv2 devices have default SSH keys which allow attackers to get root access to the devices. All firmware versions up to v5.34o, v5.34s, v5.32* or 5.34g are affected. The private key is also used in an internal interface of another Meinberg Device and can be extracted from a firmware update of this device. An update to fix the vulnerability was published by the vendor.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:meinbergglobal:syncbox\/ptpv2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:meinbergglobal:syncbox\/ptpv2:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-21 20:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-17584

Mitre link : CVE-2019-17584

CVE.ORG link : CVE-2019-17584


JSON object : View

Products Affected

meinbergglobal

  • syncbox\/ptpv2_firmware
  • syncbox\/ptpv2