Default Password 'QwestM0dem' for 'admin' Account

Critical Nessus Plugin ID 104974

Synopsis

The remote host has an account with a default password.

Description

The account 'admin' on the remote host has the default password 'QwestM0dem'. A remote attacker can exploit this issue to gain administrative access to the affected system.

Note that this username / password combination was found in the leaked source from the Mirai botnet.

Solution

Change the password for this account or disable it.

See Also

https://en.wikipedia.org/wiki/Mirai_(malware)

http://www.nessus.org/u?231314f3

Plugin Details

Severity: Critical

ID: 104974

File Name: account_admin_QwestM0dem.nasl

Version: $Revision: 1.2 $

Type: remote

Published: 2017/12/01

Modified: 2017/12/04

Dependencies: 10267, 55900, 17975

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSSv3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Metasploit (SSH User Code Execution)

Reference Information

CVE: CVE-1999-0502