CVE-2014-125121
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-31

Last updated on: 2025-07-31

Assigner: VulnCheck

Description
Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH loginΒ or a hardcoded DSA private key, allowing an attacker to authenticate remotely with limited privileges. Once authenticated, an attacker can overwrite the world-writable /ca/bin/monitor.sh script with arbitrary commands. Since this script is executed with elevated privileges through the backend binary, enabling the debug monitor via backend -c "debug monitor on" triggers execution of the attacker's payload as root. This allows full system compromise.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-31
Last Modified
2025-07-31
Generated
2026-05-07
AI Q&A
2025-07-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
array_networks vxag 9.2.0.34
array_networks vapv 8.3.2.17
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Array Networks vAPV and vxAG appliances due to hardcoded SSH credentials or a hardcoded SSH private key combined with insecure permissions on a startup script. An attacker can remotely authenticate with limited privileges using these credentials, then overwrite a world-writable startup script (/ca/bin/monitor.sh) with arbitrary commands. When the debug monitor is enabled, this script runs with elevated privileges, allowing the attacker to execute their payload as root and fully compromise the system.


How can this vulnerability impact me? :

The vulnerability allows an attacker to gain full root access to the affected device remotely. This means the attacker can take complete control over the system, potentially leading to data theft, disruption of services, unauthorized changes, and further attacks within the network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart