![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.112100 |
Categoría: | Default Accounts |
Título: | ZyXEL Modems Backup Account and Default Root Credentials (Telnet) |
Resumen: | ZyXEL PK5001Z and C1100Z modems have default root credentials set and a backdoor account with hardcoded credentials. |
Descripción: | Summary: ZyXEL PK5001Z and C1100Z modems have default root credentials set and a backdoor account with hardcoded credentials. Vulnerability Insight: In February 2018 it was discovered that this vulnerability is being exploited by the 'DoubleDoor' Internet of Things (IoT) Botnet. Vulnerability Impact: This issue may be exploited by a remote attacker to gain full access to sensitive information or modify system configuration. Solution: It is recommended to disable the telnet access and change the backup and default credentials. CVSS Score: 9.0 CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-10401 https://www.exploit-db.com/exploits/43105/ https://forum.openwrt.org/viewtopic.php?id=62266 |
Copyright | Copyright (C) 2017 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |