OpenWrt Router with a Blank Password (telnet check)

Critical Nessus Plugin ID 40354

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote router does not have a password set.

Description

The remote host is running OpenWrt, an open source Linux distribution for embedded devices, especially routers.

It is currently configured without a password, which is the case by default. Anyone can connect to the device via Telnet and gain administrative access to it.

Solution

Set a password for the device.

See Also

http://oldwiki.openwrt.org/OpenWrtDocs%282f%29Using.html

Plugin Details

Severity: Critical

ID: 40354

File Name: openwrt_blank_telnet_password.nasl

Version: Revision: 1.8

Type: remote

Family: CGI abuses

Published: 2009/07/23

Updated: 2017/03/21

Dependencies: 10281

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Metasploit (SNMP Community Scanner)

Reference Information

CVE: CVE-1999-0508