Description
The official spiped docker images before 1.5-alpine contain a blank password for a root user. Systems using the spiped docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-21943 | The official spiped docker images before 1.5-alpine contain a blank password for a root user. Systems using the spiped docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password. |
References
| Link | Providers |
|---|---|
| https://github.com/koharin/koharin2/blob/main/CVE-2020-29581 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:55:10.399Z
Reserved: 2020-12-05T00:00:00.000Z
Link: CVE-2020-29581
No data.
Status : Modified
Published: 2020-12-08T16:15:12.247
Modified: 2024-11-21T05:24:15.353
Link: CVE-2020-29581
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD