BayTech RPC3 Telnet Daemon Authentication Bypass
Critical Nessus Network Monitor Plugin ID 2781
SynopsisThe remote host is vulnerable to a flaw that allows for the bypassing of authentication.
DescriptionThe remote host is running a version of Bay Technical Associates RPC3 Telnet Daemon that lets a user bypass authentication by sending a special set of keystrokes at the username prompt. Since BayTech RPC3 devices provide remote power management, this vulnerability enables an attacker to cause a denial of service, shut down the device itself and any connected devices.
SolutionNo solution is known at this time.