Default Password 'QwestM0dem' for 'admin' Account

critical Nessus Plugin ID 104974

Synopsis

The remote host has an account with a default password.

Description

The account 'admin' on the remote host has the default password 'QwestM0dem'. A remote attacker can exploit this issue to gain administrative access to the affected system.

Note that this username / password combination was found in the leaked source from the Mirai botnet.

Solution

Change the password for this account or disable it.

See Also

https://en.wikipedia.org/wiki/Mirai_(malware)

http://www.nessus.org/u?ae5b1f64

Plugin Details

Severity: Critical

ID: 104974

File Name: account_admin_QwestM0dem.nasl

Version: 1.6

Type: remote

Published: 12/1/2017

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-1999-0502

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Metasploit (SSH User Code Execution)

Reference Information

CVE: CVE-1999-0502