Tektronix PhaserLink Multiple Admin Page Unauthenticated Configuration Manipulation

medium Nessus Plugin ID 10665

Synopsis

The remote service is prone to unauthorized access.

Description

The file /_ncl_items.shtml or /_ncl_subjects.shtml exists on the remote web server. If the remote host is a Tektronix printer, then this page allows anyone to reconfigure it without any authentication means whatsoever.

An attacker may use this flaw to conduct a denial of service attack against your business by preventing legitimate users from printing their work, or against your network, by changing the IP address of the printer so that it conflicts with the IP address of your file server.

Solution

Filter incoming traffic to port 80 to this device, contact Tektronix for a patch.

See Also

http://www.nessus.org/u?c775ca26

Plugin Details

Severity: Medium

ID: 10665

File Name: ncl_items_2.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 5/10/2001

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 11/16/1999

Reference Information

CVE: CVE-2001-0484

BID: 2659