AirConnect Default Password

High Nessus Plugin ID 10961

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

It is possible to access the remote wireless access point with default credentials.

Description

This AirConnect wireless access point still has the default password set for the web interface. This could be abused by an attacker to gain full control over the wireless network settings.

Solution

Change the password to something difficult to guess via the web interface.

Plugin Details

Severity: High

ID: 10961

File Name: DDI_AirConnect_Default_Password.nasl

Version: 1.21

Type: remote

Family: Misc.

Published: 2002/05/22

Updated: 2020/06/12

Dependencies: 10107

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2002/09/12

Exploitable With

Metasploit (SNMP Community Scanner)

Reference Information

CVE: CVE-1999-0508