Riverbed RiOS through 9.6.0 has a weak default password for the secure vault, which makes it easier for physically proximate attackers to defeat the secure-vault protection mechanism by leveraging knowledge of the password algorithm and the appliance serial number. NOTE: the vendor believes that this does not meet the definition of a vulnerability. The product contains correct computational logic for supporting arbitrary password changes by customers; however, a password change is optional to meet different customers' needs
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:56:36.420Z
Reserved: 2017-03-29T00:00:00.000Z
Link: CVE-2017-7306
Updated: 2024-08-05T15:56:36.420Z
Status : Deferred
Published: 2017-04-04T16:59:00.283
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-7306
No data.
OpenCVE Enrichment
No data.
Weaknesses