Multiple Switch Vendors '__super' Account Backdoor

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

It is possible to log on the remote network switch with a
default password.

Description :

Nessus was able to log into the remote host as the '__super' user
and a password based on the switch's MAC address. This is likely
a built-in account that cannot be disabled and whose password
cannot be changed.

A remote attacker with knowledge of this switch's MAC address could
exploit this by logging in and gaining complete control of the
device.

See also :

https://har2009.org/program/events/103.en.html
http://www.vettebak.nl/hak/
http://stuff.zoiah.net/doku.php?id=accton:backdoor

Solution :

There is no known solution at this time. Restrict access to
this device.

Risk factor :

High / CVSS Base Score : 8.3
(CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.5
(CVSS2#E:F/RL:W/RC:ND)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 49217 (accton_super_user_backdoor.nasl)

Bugtraq ID: 42947

CVE ID: