Default Password (sq!us3r) for 'dbadmin' Account

Critical Nessus Plugin ID 42147

Synopsis

The remote system can be accessed with a default account.

Description

The account 'dbadmin' on the remote host has the password 'sq!us3r'.

An attacker may leverage this issue to gain access to the affected system.

Note that RioRey RIOS appliances, used for dynamic denial of service mitigation, are reported to use these credentials to support connections from rVIEW, the vendor's central management and configuration tool, and that an attacker reportedly may be able to escalate privileges through several vulnerabilities to gain full control over the device.

Solution

If the affected device is a RioRey platform, contact the vendor for a patch.

Otherwise, change the password for this account or disable it.

See Also

https://packetstormsecurity.com/0910-exploits/riorey-passwd.txt

Plugin Details

Severity: Critical

ID: 42147

File Name: account_dbadmin_squs3r.nasl

Version: 1.19

Type: remote

Published: 2009/10/15

Updated: 2018/11/15

Dependencies: 55900, 10267, 17975

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:TF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:T/RC:C

Vulnerability Information

Exploit Available: false

Exploit Ease: No exploit is required

Patch Publication Date: 2009/10/05

Vulnerability Publication Date: 2009/10/07

Exploitable With

Metasploit (SSH User Code Execution)

Reference Information

CVE: CVE-1999-0502, CVE-2009-3710

BID: 42349

Secunia: 36971

CWE: 255