2022-06-24 15:00:32
icscert
PUBLISHED
Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.