Microsoft SQL Server sa Account Default Blank Password

critical Nessus Plugin ID 10673

Synopsis

The remote database service has an account with a blank password.

Description

The remote instance of MS SQL / SQL Server has the default 'sa' account enabled without any password.

An attacker may leverage this flaw to execute commands against the remote host, as well as read the content of any databases it might have.

Solution

Disable the 'sa' account or set a password for it.

In addition, filter incoming TCP traffic to this port.

For MSDE (OEM versions without MSQL console) :

C:\MSSQL7\BINN\osql -U sa

At the Password: prompt press <Enter>.

Type the following replacing .password. with the password you wish to assign, in single quotes:

EXEC sp_password NULL, .password., .sa.
go exit

Plugin Details

Severity: Critical

ID: 10673

File Name: mssql_blank_password.nasl

Version: 1.42

Type: remote

Family: Databases

Published: 5/25/2001

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2000-1209

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:sql_server

Excluded KB Items: global_settings/supplied_logins_only

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/11/2000

Exploitable With

CANVAS (CANVAS)

Metasploit (Microsoft SQL Server Payload Execution via SQL Injection)

Reference Information

CVE: CVE-2000-1209

BID: 4797