First published: Tue Apr 04 2017(Updated: )
** DISPUTED ** Riverbed RiOS through 9.6.0 does not require a bootloader password, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism via a crafted boot. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for a bootloader password; however, this password is optional to meet different customers' needs.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed RiOS | <=9.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7305 is disputed by the vendor and is not classified as a severity vulnerability.
There is no official fix for CVE-2017-7305 as the vendor does not acknowledge it as a vulnerability.
CVE-2017-7305 affects Riverbed RiOS versions up to and including 9.6.0.
CVE-2017-7305 allows physical attackers to bypass the secure-vault mechanism due to lack of a bootloader password.
Riverbed has not addressed CVE-2017-7305, stating it does not meet their definition of a vulnerability.