![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.11879 |
Categoría: | Default Accounts |
Título: | Compaq Web-based Management Default Credentials (HTTP) |
Resumen: | Checks the administrator account on Compaq Web-based Management / HP System Management; agents for the default or predictable passwords. |
Descripción: | Summary: Checks the administrator account on Compaq Web-based Management / HP System Management agents for the default or predictable passwords. Vulnerability Insight: The Compaq Web-based Management / HP System Management Agent active on the remote host is configured with the default, or a predictable, administrator password. Depending on the agents integrated, this allows an attacker to view sensitive and verbose system information, and may even allow more active attacks such as rebooting the remote system. Furthermore, if an SNMP agent is configured on the remote host it may disclose the SNMP community strings in use, allowing an attacker to set device configuration if the 'write' community string is uncovered. To manually test for this bug, you can log into the Compaq web server via a browser (https://example.com:2381/). Log in with a username/password combination of administrator/ Solution: Ensure that all passwords for Compaq Web-based Management / HP System Management Agent accounts are set to stronger, less easily guessable, alternatives. As a further precaution, use the 'IP Restricted Logins' setting to allow only authorised IP's to manage this agent. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Copyright | Copyright (C) 2004 SensePost |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |