Cisco 675 router without password 1.0
 
Plugin ID290
Plugin nameCisco 675 router without password
Plugin filenameCisco 675 router without password.plugin
Plugin filesize2180 bytes
Plugin familyNetwork Devices
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/04
Plugin version1.0
Plugin protocoltcp
Plugin port23
Plugin exploit accuracy90
Plugin commentThe NASL script is Copyright (C) 1999 Renaud Deraison
Bug produced nameCisco Systems
Bug produced emailinfo at cisco dot com
Bug produced webhttp://www.cisco.com
Bug affectedCisco 675 router
Bug not affectedOther solutions
Bug vulnerability classConfiguration
Bug descriptionThe remote CISCO router is passwordless. This means that anyone can telnet to it and reconfigure it to lock you out of it, and to prevent you to use your internet connection.
Bug solutiontelnet to this router and set a password immediately.
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityYes
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity9
Bug simplicity8
Bug impact9
Bug risk8
Bug Nessus riskHigh
Bug check toolsNessus can check this flaw with the plugin 10045 (Cisco 675 passwordless router).
Source CVECVE-1999-0889
Source Nessus ID10045
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.