Alcatel OmniSwitch Default Credentials (http)

high Nessus Plugin ID 70211

Synopsis

The remote web application uses default credentials.

Description

It is possible to log into the remote Alcatel Switch by providing the default credentials. A remote attacker could exploit this to gain administrative control of this installation.

Solution

Secure any default accounts with a strong password.

Plugin Details

Severity: High

ID: 70211

File Name: alcatel_aos_default_http_creds.nasl

Version: 1.4

Type: remote

Family: CGI abuses

Published: 9/30/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/h:alcatel-lucent:omniswitch, cpe:/o:alcatel:aos

Excluded KB Items: global_settings/supplied_logins_only