Western Digital Arkeia Virtual Appliance Blank Password

high Nessus Plugin ID 74218

Synopsis

A web application is protected using a blank password.

Description

The remote Western Digital Arkeia Virtual Appliance uses a blank password to control access to its management interface. With this information, an attacker can gain administrative access to the web administration interface for the appliance.

Solution

Log into the application and set a strong password.

Plugin Details

Severity: High

ID: 74218

File Name: wd_arkeia_default_creds.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 5/28/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:wdc:arkeia_virtual_appliance

Required KB Items: www/PHP, www/wd_arkeia

Excluded KB Items: global_settings/supplied_logins_only