Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-31970

EPSS 0.14% · P34
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-31970

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
AdTran SRG 834-5 HDC17600021F1 devices (with SmartOS 11.1.1.1 and fixed in Version 12.1.3.1) have SSH enabled by default, accessible both over the LAN and the Internet. During a window of time when the device is being set up, it uses a default username and password combination of admin/admin with root-level privileges. An attacker can exploit this window to gain unauthorized root access by either modifying the existing admin account or creating a new account with equivalent privileges. This vulnerability allows attackers to execute arbitrary commands. NOTE: The vendor has disputed this, finding the report not applicable. According to AdTran, SSH has never been accessible (from WAN) on SmartOS official builds. Furthermore, the vendor adds that test build 11.1.0.101-202106231430 was never released to end users.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
AdTran SRG 834-5 HDC17600021F1 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
AdTran SRG 834-5 HDC17600021F1是美国Adtran的一款千兆以太网网关 AdTran SRG 834-5 HDC17600021F1 SmartOS 11.1.1.1版本存在安全漏洞,该漏洞源于设备默认启用了SSH,导致攻击者可通过修改现有管理员帐户或创建具有同等权限的新帐户来获得未经授权的root访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-31970

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-31970

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-07-24 · 28 CVEs total

CVE-2024-40767OpenStack 安全漏洞
CVE-2024-36537cert-manager 安全漏洞
CVE-2024-36535Meshery 安全漏洞
CVE-2024-36536FabEdge 安全漏洞
CVE-2024-36533Volcano 安全漏洞
CVE-2024-36539Contour 安全漏洞
CVE-2024-36540External Secrets 安全漏洞
CVE-2024-36541Logging operator 安全漏洞
CVE-2024-36534HwameiStor 安全漏洞
CVE-2024-36538Chaos Mesh 安全漏洞
CVE-2024-40575Huawei openGauss 安全漏洞
CVE-2024-40137Dolibarr ERP/CRM 安全漏洞
CVE-2024-40422Devika 安全漏洞
CVE-2024-40495Linksys E2500 安全漏洞
CVE-2024-39345AdTran SRG 834-5 HDC17600021F1 安全漏洞
CVE-2024-31977Adtran 834-5 安全漏洞
CVE-2024-31971AdTran NetVanta 3120 安全漏洞
CVE-2024-41550CampCodes Supplier Management System 安全漏洞
CVE-2024-41462Tenda FH1201 安全漏洞
CVE-2024-41464Tenda FH1201 安全漏洞

Showing top 20 of 28 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-31970

No comments yet


Leave a comment