CVE-2015-0936
📋 TL;DR
CVE-2015-0936 allows remote attackers to gain SSH access to Ceragon FibeAir IP-10 devices using a default SSH private key that corresponds to a public key in the authorized_keys file for the mateidu user. This affects all Ceragon FibeAir IP-10 devices with default configurations, enabling complete system compromise.
💻 Affected Systems
- Ceragon FibeAir IP-10
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to reconfigure network devices, intercept traffic, disable services, or use devices as pivot points into internal networks.
Likely Case
Unauthorized SSH access leading to configuration changes, data exfiltration, or device disruption.
If Mitigated
No impact if default SSH keys have been removed or changed.
🎯 Exploit Status
Exploitation requires only the default private key which has been publicly disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: N/A
Restart Required: No
Instructions:
1. Remove the default public key from /home/mateidu/.ssh/authorized_keys
2. Generate new SSH key pairs for authorized users
3. Disable SSH access for mateidu user if not needed
🔧 Temporary Workarounds
Remove Default SSH Key
linuxDelete the default public key from the authorized_keys file
rm /home/mateidu/.ssh/authorized_keys
chmod 600 /home/mateidu/.ssh/authorized_keys
Disable SSH for mateidu
linuxRemove SSH access for the vulnerable user account
passwd -l mateidu
usermod -s /sbin/nologin mateidu
🧯 If You Can't Patch
- Implement network segmentation to isolate FibeAir devices from untrusted networks
- Use firewall rules to restrict SSH access to trusted IP addresses only
🔍 How to Verify
Check if Vulnerable:
Check if /home/mateidu/.ssh/authorized_keys contains the default public key (available in public disclosures)
Check Version:
show version (device-specific command)
Verify Fix Applied:
Verify authorized_keys file is empty or contains only authorized public keys, and test SSH access with default private key fails
📡 Detection & Monitoring
Log Indicators:
- Failed SSH authentication attempts followed by successful mateidu login
- SSH sessions from unexpected IP addresses
Network Indicators:
- SSH connections to port 22 from suspicious sources
- Unusual outbound traffic from FibeAir devices
SIEM Query:
source="fibeair" AND event="ssh_login" AND user="mateidu"
🔗 References
- http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html
- http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html
- http://seclists.org/fulldisclosure/2015/Apr/3
- http://www.securityfocus.com/bid/73696
- https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwjs47SGp47UAhVF5iYKHYGLDQkQFggoMAE&url=https%3A%2F%2Fwww.rapid7.com%2Fdb%2Fmodules%2Fexploit%2Flinux%2Fssh%2Fceragon_fibeair_known_privkey&usg=AFQjCNFZiZcWj47cpqPX-AbfpsW0DL4yYw
- http://packetstormsecurity.com/files/131259/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html
- http://packetstormsecurity.com/files/131260/Ceragon-FibeAir-IP-10-SSH-Private-Key-Exposure.html
- http://seclists.org/fulldisclosure/2015/Apr/3
- http://www.securityfocus.com/bid/73696
- https://gist.github.com/todb-r7/5d86ecc8118f9eeecc15
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwjs47SGp47UAhVF5iYKHYGLDQkQFggoMAE&url=https%3A%2F%2Fwww.rapid7.com%2Fdb%2Fmodules%2Fexploit%2Flinux%2Fssh%2Fceragon_fibeair_known_privkey&usg=AFQjCNFZiZcWj47cpqPX-AbfpsW0DL4yYw