Description
OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-3314 | OpenELEC and RasPlex devices have a hardcoded password for the root account, which makes it easier for remote attackers to obtain access via an SSH session. |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T23:24:48.904Z
Reserved: 2016-02-07T00:00:00.000Z
Link: CVE-2016-2230
No data.
Status : Modified
Published: 2016-02-08T16:59:11.440
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-2230
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD