CVE-2019-19755

ethOS through 1.3.3 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-12-01, the vendor indicated that they plan to fix this.
Configurations

No configuration.

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () http://ethosdistro.com/changelog/ - () http://ethosdistro.com/changelog/ -
References () https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html - () https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html -

25 Oct 2024, 20:35

Type Values Removed Values Added
CWE CWE-300 CWE-639

15 Aug 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-300
Summary
  • (es) ethOS hasta 1.3.3 se entrega con claves de host SSH incorporadas en la imagen de instalación, lo que permite ataques de intermediario y hace que la identificación de todos los nodos IPv4 públicos sea trivial con Shodan.io. NOTA: a partir del 1 de diciembre de 2019, el proveedor indicó que planea solucionar este problema.

30 Apr 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-30 18:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19755

Mitre link : CVE-2019-19755

CVE.ORG link : CVE-2019-19755


JSON object : View

Products Affected

No product.

CWE
CWE-639

Authorization Bypass Through User-Controlled Key