First published: Thu Aug 30 2018(Updated: )
Eaton Power Xpert Meter 4000, 6000, and 8000 devices before 13.4.0.10 have a single SSH private key across different customers' installations and do not properly restrict access to this key, which makes it easier for remote attackers to perform SSH logins (to uid 0) via the PubkeyAuthentication option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Power Xpert Meter 4000 Firmware | <13.4.0.10 | |
Eaton Power Xpert Meter 4000 | ||
Eaton Power Xpert Meter 6000 Firmware | <13.4.0.10 | |
Eaton Power Xpert Meter 6000 | ||
Eaton Power Xpert Meter 8000 Firmware | <13.4.0.10 | |
Eaton Power Xpert Meter 8000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16158 has a severity of critical.
CVE-2018-16158 allows remote attackers to perform SSH logins with root access to Eaton Power Xpert Meter 4000, 6000, and 8000 devices before version 13.4.0.10.
The affected software for CVE-2018-16158 includes Eaton Power Xpert Meter 4000, 6000, and 8000 devices before version 13.4.0.10.
To fix CVE-2018-16158, upgrade Eaton Power Xpert Meter firmware to version 13.4.0.10 or higher.
More information about CVE-2018-16158 can be found on the Eaton website and in the provided references.