AirConnect Default Password

This script is Copyright (C) 2002-2014 Digital Defense Inc.


Synopsis :

It is possible to access the remote wireless access point with default
credentials.

Description :

This AirConnect wireless access point still has the default password
set for the web interface. This could be abused by an attacker to gain
full control over the wireless network settings.

Solution :

Change the password to something difficult to guess via the web
interface.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 10961 (DDI_AirConnect_Default_Password.nasl)

Bugtraq ID:

CVE ID: CVE-1999-0508

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial