How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote host has software that uses a weak password generator.
The remote host has a version of ProSoft RadioLinx ControlScape
installed that has a flaw in the random number generator. This flaw
could cause predictable passwords to be generated. A remote attacker
could potentially exploit this by using a brute force attack in order to
gain access to network devices managed by RadioLinx ControlScape.
See also :
Upgrade to RadioLinx v6.00.040 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Nessus Plugin ID: 70416 ()
Bugtraq ID: 62238
CVE ID: CVE-2013-2803
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.