Pocsag POC32 Remote Service Default Password (password)

Medium Nessus Plugin ID 10341


The remote server gives access to protected data.


It is possible to log into the remote pocsag service and view the streams of decoded pager messages using the password 'password'.

An attacker may use this problem to gain some knowledge about the computer user and then trick him by social engineering.


Change the password to a random one, or filter incoming connections to this port

Plugin Details

Severity: Medium

ID: 10341

File Name: poc32.nasl

Version: $Revision: 1.19 $

Type: remote

Family: Misc.

Published: 2000/03/07

Modified: 2015/10/09

Dependencies: 17975

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2002/09/12

Reference Information

CVE: CVE-2000-0225

BID: 1032

OSVDB: 259