Cayman DSL Router Single Character String Authentication Bypass.

high Nessus Plugin ID 10724

Synopsis

The remote router is secured with a default username and password.

Description

The remote host appears to be a Cayman DSL router. This device contains an insecure user account - it was possible to login with a username of '{' and no password.

Solution

Give the account a strong password.

See Also

https://seclists.org/bugtraq/2001/Jul/183

Plugin Details

Severity: High

ID: 10724

File Name: cayman_any_username.nasl

Version: 1.30

Type: remote

Family: Misc.

Published: 8/13/2001

Updated: 4/7/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/h:cayman:3220-h_dsl_router

Excluded KB Items: global_settings/supplied_logins_only

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 7/11/2001

Reference Information

CVE: CVE-2001-1430

BID: 3017