Microsoft SQL Server sa Account Default Blank Password

critical Nessus Plugin ID 10673


The remote database service has an account with a blank password.


The remote instance of MS SQL / SQL Server has the default 'sa' account enabled without any password.

An attacker may leverage this flaw to execute commands against the remote host, as well as read the content of any databases it might have.


Disable the 'sa' account or set a password for it.

In addition, filter incoming TCP traffic to this port.

For MSDE (OEM versions without MSQL console) :

C:\MSSQL7\BINN\osql -U sa

At the Password: prompt press <Enter>.

Type the following replacing .password. with the password you wish to assign, in single quotes:

EXEC sp_password NULL, .password., .sa.
go exit

Plugin Details

Severity: Critical

ID: 10673

File Name: mssql_blank_password.nasl

Version: 1.42

Type: remote

Family: Databases

Published: 5/25/2001

Updated: 4/11/2022

Configuration: Enable thorough checks

Risk Information


Risk Factor: High

Score: 8.1


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2000-1209


Risk Factor: Critical

Base Score: 10

Temporal Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:sql_server

Excluded KB Items: global_settings/supplied_logins_only

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/11/2000

Exploitable With


Metasploit (Microsoft SQL Server Payload Execution via SQL Injection)

Reference Information

CVE: CVE-2000-1209

BID: 4797