Trojan/Backdoor - Arugizer Detection

high Nessus Network Monitor Plugin ID 5357

Synopsis

The remote host has been compromised and is running a 'Backdoor' program

Description

Arugizer backdoor activity has been detected. This indicates that a successful reply to a YES command sent to the Arugizer backdoor has been seen, which is a clear sign that the backdoor is installed and responding to commands.

Solution

Update your Antivirus and perform a full scan of the remote operating system.

See Also

http://www.kb.cert.org/vuls/id/154421

http://www.nessus.org/u?fba833e0

http://www.nessus.org/u?b341c9b0

Plugin Details

Severity: High

ID: 5357

Family: Backdoors

Published: 3/9/2010

Updated: 3/6/2019

Nessus ID: 45005, 45006

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:energizer:duo_usb

Vulnerability Publication Date: 3/5/2010

Exploitable With

Metasploit (Energizer DUO Trojan Code Execution)

Reference Information

CVE: CVE-2010-0103

BID: 38571