Pocsag POC32 Remote Service Default Password (password)

This script is Copyright (C) 2000-2015 Tenable Network Security, Inc.

Synopsis :

The remote server gives access to protected data.

Description :

It is possible to log into the remote pocsag service and view the
streams of decoded pager messages using the password 'password'.

An attacker may use this problem to gain some knowledge about the
computer user and then trick him by social engineering.

Solution :

Change the password to a random one, or filter incoming connections to
this port

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 10341 ()

Bugtraq ID: 1032

CVE ID: CVE-2000-0225

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now