IBM Rational Focal Point Default Credentials

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.

Synopsis :

The remote host is running a web application that is using a known set
of default credentials.

Description :

Nessus was able to login to the remote IBM Rational Focal Point install
using a default set of known credentials. A remote attacker using these
credentials can gain administrative access to the web application.

Solution :

Change the password for the 'admin' user.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.5
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 72860 ()

Bugtraq ID:


Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial