Array Networks vxAG/xAPV Authentication Bypass Vulnerabilities

Summary
This host is running Array Networks vxAG/xAPV and is prone to authentication bypass vulnerabilities.
Impact
Successful exploitation will allow attacker to gain unauthorized root access to affected devices and completely compromise the devices. Impact Level: System/Application
Solution
No Solution is available as of 20th March, 2014. Information regarding this issue will be updated once the solution details are available. For more information refer to http://www.arraynetworks.com
Insight
Multiple flaws are due to - The program using insecure world writable permissions for the '/ca/bin/monitor.sh' file. - The 'mfg' account has a password of 'mfg' and the 'sync' account has a password of 'click1', which is publicly known and documented. - If a remote attacker has explicit knowledge of the SSH keys they can potentially gain privileged access to the device.
Affected
Array Networks vxAG 9.2.0.34 and vAPV 8.3.2.17 appliances
Detection
Send a default SSH credentials and check whether it is possible to login to the target machine
References