Plugin ID | 293 |
Plugin name | Cisco device without password |
Plugin filename | Cisco device without password.plugin |
Plugin filesize | 2246 bytes |
Plugin family | Network Devices |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/04 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 23 |
Plugin procedure exploit | open|sleep|send password\n|sleep|send show ver\n|sleep|close|pattern_exists Cisco Internetwork Operating System Software |
Plugin exploit accuracy | 98 |
Plugin comment | The NASL script is Copyright (C) 2001 Renaud Deraison |
Bug produced name | Cisco Systems |
Bug produced email | info at cisco dot com |
Bug produced web | http://www.cisco.com |
Bug vulnerability class | Configuration |
Bug description | The remote CISCO router has no password set. This allows an attacker to get a lot information about your network, and possibly to shut it down if the 'enable' password is not set either. |
Bug solution | telnet to this device and set a password. |
Bug fixing time | Approx. 20 minutes |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Maybe |
Bug severity | High |
Bug popularity | 9 |
Bug simplicity | 7 |
Bug impact | 9 |
Bug risk | 8 |
Bug Nessus risk | High |
Bug check tools | Nessus can check this flaw with the plugin 10754 (Cisco password not set). |
Source CVE | CAN-1999-0508 |
Source Nessus ID | 10754 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |