Default Password (raspi) for 'root' Account

critical Nessus Plugin ID 64262

Synopsis

The remote system can be accessed with a default password.

Description

The account 'root' on the remote host has the password 'raspi'.

An attacker may leverage this issue to gain full access to the affected system.

Note that a version of Linux optimized for Raspberry Pi ARM computers is known to use these credentials by default.

Solution

Set a strong password for this account, or use ACLs to restrict access to the host.

See Also

http://moebiuslinux.sourceforge.net/documentation/installation-guide/

Plugin Details

Severity: Critical

ID: 64262

File Name: account_root_raspi.nasl

Version: 1.8

Type: remote

Published: 1/28/2013

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-1999-0502

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Metasploit (SSH User Code Execution)

Reference Information

CVE: CVE-1999-0502