This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.
The remote TELNET server is affected by an authentication bypass flaw.
The remote host is running a version of Bay Technical Associates RPC3
TELNET Daemon that lets a user bypass authentication by sending a
special set of keystrokes at the username prompt. Since BayTech RPC3
devices provide remote power management, this vulnerability enables an
attacker to cause a denial of service, shut down the device itself as
well as any connected devices.
See also :
None at this time. Filter incoming traffic to port 23 on this device.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 10.0
Public Exploit Available : true