Default Password (sq!us3r) for 'dbadmin' Account

Critical Nessus Plugin ID 42147


The remote system can be accessed with a default account.


The account 'dbadmin' on the remote host has the password 'sq!us3r'.

An attacker may leverage this issue to gain access to the affected system.

Note that RioRey RIOS appliances, used for dynamic denial of service mitigation, are reported to use these credentials to support connections from rVIEW, the vendor's central management and configuration tool, and that an attacker reportedly may be able to escalate privileges through several vulnerabilities to gain full control over the device.


If the affected device is a RioRey platform, contact the vendor for a patch.

Otherwise, change the password for this account or disable it.

See Also

Plugin Details

Severity: Critical

ID: 42147

File Name: account_dbadmin_squs3r.nasl

Version: $Revision: 1.12 $

Type: remote

Published: 2009/10/15

Modified: 2017/11/20

Dependencies: 55900, 10267, 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/10/05

Vulnerability Publication Date: 2009/10/07

Reference Information

CVE: CVE-1999-0502, CVE-2009-3710

BID: 42349

OSVDB: 58858

Secunia: 36971

CWE: 255