CVE-2023-1778

Default Credential Vulnerability in GajShield Data Security Firewall

Description

This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems. The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.

Remediation

Solution:

  • Update GajShield Data Security Firewall firmware to latest version https://kb.gajshield.com/kbarticle?entryid=299&parentid=35 https://kb.gajshield.com/kbarticle https://kb.gajshield.com/kbarticle?entryid=318&parentid=35 https://kb.gajshield.com/kbarticle

Categories

10.0
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.26%
Third-Party Advisory org.in
Affected: GajShield Data Security Firewall
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-1778?
CVE-2023-1778 has been scored as a critical severity vulnerability.
How to fix CVE-2023-1778?
To fix CVE-2023-1778: Update GajShield Data Security Firewall firmware to latest version https://kb.gajshield.com/kbarticle?entryid=299&parentid=35 https://kb.gajshield.com/kbarticle https://kb.gajshield.com/kbarticle?entryid=318&parentid=35 https://kb.gajshield.com/kbarticle
Is CVE-2023-1778 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-1778 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-1778?
CVE-2023-1778 affects GajShield Data Security Firewall.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.