The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Riverbed Steelhead: three vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of Riverbed Steelhead.
Impacted systems: SteelHead.
Severity of this alert: 2/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 05/04/2017.
Références of this alert: CVE-2017-7305, CVE-2017-7306, CVE-2017-7307, S30065, VIGILANCE-VUL-22337.

Description of the vulnerability 

Several vulnerabilities were announced in Riverbed Steelhead.

An attacker can bypass security features via Empty Bootloader Password, in order to escalate his privileges. [severity:1/4; CVE-2017-7305]

An attacker can bypass security features via Default Password, in order to escalate his privileges. [severity:1/4; CVE-2017-7306]

An attacker can bypass security features via /opt/tms/bin/cli, in order to escalate his privileges. [severity:2/4; CVE-2017-7307]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat impacts software or systems such as SteelHead.

Our Vigil@nce team determined that the severity of this computer threat is medium.

The trust level is of type unique source, with an origin of user shell.

This bulletin is about 3 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this cybersecurity bulletin.

Solutions for this threat 

Riverbed Steelhead: solution.
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer security note. The technology watch team tracks security threats targeting the computer system.