Default Password (sq!us3r) for 'dbadmin' Account

Critical Nessus Plugin ID 42147


The remote system can be accessed with a default account.


The account 'dbadmin' on the remote host has the password 'sq!us3r'.

An attacker may leverage this issue to gain access to the affected system.

Note that RioRey RIOS appliances, used for dynamic denial of service mitigation, are reported to use these credentials to support connections from rVIEW, the vendor's central management and configuration tool, and that an attacker reportedly may be able to escalate privileges through several vulnerabilities to gain full control over the device.


If the affected device is a RioRey platform, contact the vendor for a patch.

Otherwise, change the password for this account or disable it.

See Also

Plugin Details

Severity: Critical

ID: 42147

File Name: account_dbadmin_squs3r.nasl

Version: 1.19

Type: remote

Published: 2009/10/15

Updated: 2018/11/15

Dependencies: 55900, 10267, 17975

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:TF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:T/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: false

Exploit Ease: No exploit is required

Patch Publication Date: 2009/10/05

Vulnerability Publication Date: 2009/10/07

Exploitable With

Metasploit (SSH User Code Execution)

Reference Information

CVE: CVE-1999-0502, CVE-2009-3710

BID: 42349

Secunia: 36971

CWE: 255