Barracuda Appliances Default Credentials

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

An account on the remote host uses a default password.

Description :

The account 'product' or 'emailswitch' is using a default password. A
remote, unauthenticated attacker could exploit this to log in as an
unprivileged user. After logging in, an attacker can log into the local
MySQL server as root without a password. Additionally, getting access
to a root shell is trivial.

It is also likely that this host allows remote logins using the 'root',
'cluster', and 'remote' accounts using public key authentication, but
Nessus has not checked for those issues.

See also :

http://archives.neohapsis.com/archives/fulldisclosure/2013-01/0221.html
https://www.barracudanetworks.com/support/techalerts#41

Solution :

Upgrade to Security Definition 2.0.5 or later.

Note that this fix does not disable access to the root, cluster, or
remote accounts.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 64258 ()

Bugtraq ID: 57537

CVE ID: