Cisco ATA-186 http password attack 2.0
 
Plugin ID24
Plugin nameCisco ATA-186 http password attack
Plugin filenameCisco ATA-186 http password.plugin
Plugin filesize3001 bytes
Plugin familyNetwork devices
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2003/11/14
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/14
Plugin version2.0
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.4. Improved the pattern matching and introduced the plugin changelog in 2.0
Plugin protocoltcp
Plugin port80
Plugin procedure detectionopen|send POST\nContent-length:1\n\na\n\n|sleep|close|pattern_exists HTTP
Plugin detection accuracy10
Plugin commentThis plugin was written with the ATK Attack Editor.
Bug advisoryhttp://www.cisco.com/warp/public/707/ata186-password-disclosure.shtml
Bug produced nameCisco Systems
Bug produced emailinfo at cisco dot com
Bug produced webhttp://www.cisco.com
Bug affectedCisco ATA-186
Bug not affectedOther Cisco and network devices
Bug vulnerability classWeak Authentication
Bug descriptionIt is possible to bypass the password authentication of a Cisco ATA-186 by sending a HTTP POST request with one byte as payload.
Bug solutionUpgrade your Cisco firmware and filter incoming traffic on port tcp/80.
Bug fixing time20 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://www.securityfocus.com/bid/4711/exploit/
Bug remoteYes
Bug localNo
Bug severityHigh
Bug popularity7
Bug simplicity6
Bug impact10
Bug risk7
Bug Nessus riskHigh
Bug check toolsNessus is also able to do the same check.
Source CVECAN-2002-0769
Source SecurityFocus BID4711
Source Nessus ID11012
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.