First published: Wed Aug 15 2007(Updated: )
NETGEAR (formerly Infrant) ReadyNAS RAIDiator before 4.00b2-p2-T1 beta creates a default SSH root password derived from the hardware serial number, which makes it easier for remote attackers to guess the password and obtain login access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Readynas Raidiator | =3.01c1-p1 | |
Netgear Readynas Raidiator | =3.01c1-p6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4361 is considered a high severity vulnerability due to its potential for facilitating unauthorized access through weak default credentials.
To fix CVE-2007-4361, change the default SSH root password to a strong, unique password that is not derived from hardware identifiers.
CVE-2007-4361 affects Netgear ReadyNAS RAIDiator versions 3.01c1-p1 and 3.01c1-p6.
Users of Netgear (Infrant) ReadyNAS devices running vulnerable versions of RAIDiator are at risk from CVE-2007-4361.
Yes, CVE-2007-4361 can be exploited remotely, allowing attackers to gain unauthorized login access.