This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote system can be accessed with a default account.
The account 'dbadmin' on the remote host has the password 'sq!us3r'.
An attacker may leverage this issue to gain access to the affected
Note that RioRey RIOS appliances, used for dynamic denial of service
mitigation, are reported to use these credentials to support
connections from rVIEW, the vendor's central management and
configuration tool, and that an attacker reportedly may be able to
escalate privileges through several vulnerabilities to gain full
control over the device.
See also :
If the affected device is a RioRey platform, contact the vendor for a
Otherwise, change the password for this account or disable it.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true
Family: Default Unix Accounts
Nessus Plugin ID: 42147 (account_dbadmin_squs3r.nasl)
Bugtraq ID: 42349
CVE ID: CVE-1999-0502CVE-2009-3710
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.