Janitza Hard-Coded FTP Password

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is running an FTP server that can be accessed with
hard-coded credentials.

Description :

The remote Janitza FTP server can be accessed with hard-coded
credentials. A remote attacker can leverage the credentials to upload
and download arbitrary files.

See also :

https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03
http://www.janitza.com/experimental-downloads.html

Solution :

Upgrade to an experimental firmware version available from the vendor
website. Alternatively, change the administrator FTP password and
secure non-essential ports with a firewall per the vendor
documentation.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: FTP

Nessus Plugin ID: 86905 ()

Bugtraq ID: 77291

CVE ID: CVE-2015-3968

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now