Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2015-0936 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Default SSH private key exposure in **Ceragon FibeAir IP-10**. πŸ“‰ **Consequences**: Remote attackers gain unauthorized SSH access. Critical security breach due to hardcoded credentials.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: The `authorized_keys` file contains a **default SSH public key** for the `mateidu` user. ❌ **Flaw**: Hardcoded credentials instead of unique, generated keys per device.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Ceragon FibeAir IP-10** (Wireless Backhaul Node). 🌐 **Vendor**: Ceragon. ⚠️ **Scope**: Devices using this specific hardware model with default configurations.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: Full **SSH access** as user `mateidu`. πŸ”“ **Data**: Potential remote code execution, network configuration changes, and data exfiltration.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. 🌍 **Auth**: No authentication required (public key is known). βš™οΈ **Config**: Default settings exploited. Remote exploitation is trivial for any attacker with network access.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp?**: **YES**. πŸ“œ **References**: PacketStorm Security, Full Disclosure mailing list, GitHub Gist. πŸš€ **Status**: Well-documented PoC available since April 2015.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Ceragon FibeAir IP-10** devices. πŸ—οΈ **Test**: Attempt SSH login with the known default private key for `mateidu`.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Official patches or key rotation updates from **Ceragon**. πŸ”„ **Mitigation**: Change default keys immediately. πŸ“… **Published**: Advisory released June 2017 (initial disclosure April 2015).

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1️⃣ **Isolate** device from public networks. 2️⃣ **Change** the `mateidu` user's SSH keys immediately. 3️⃣ **Restrict** SSH access via ACLs. πŸ›‘ **Critical**: Do not leave default keys active.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. 🚨 **Priority**: Immediate action required. πŸ“‰ **Risk**: Automated exploitation is likely due to known default keys. πŸ›‘οΈ **Action**: Patch or rotate keys NOW to prevent remote takeover.