Avaya P330 Stackable Switch Default Password

Critical Nessus Plugin ID 17638

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote switch can be accessed with default root credentials.

Description

The remote host appears to be an Avaya P330 Stackable Switch with its default password set.

An attacker could use this default password to gain remote access to the affected switch. This password could also be potentially used to gain other sensitive information about the remote network from the switch.

Solution

Telnet to this switch and change the default password.

See Also

http://www.phenoelit-us.org/dpl/dpl.html

Plugin Details

Severity: Critical

ID: 17638

File Name: avaya_switches.nasl

Version: Revision: 1.11

Type: remote

Family: Misc.

Published: 2005/03/28

Updated: 2012/08/15

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Metasploit (SNMP Community Scanner)

Reference Information

CVE: CVE-1999-0508