Quest DR Series Appliance Web Default Administrator Credentials

high Nessus Plugin ID 107197

Synopsis

A web application is protected using default administrative credentials.

Description

The web interface for the Quest DR Series disk backup appliance, formerly Dell DR Series, uses a default set of credentials (administrator / St0r@ge!) to control access to its management interface. A remote attacker can exploit this to gain administrative access to the web interface.

Solution

Change the default administrative login credentials.

See Also

http://www.nessus.org/u?e5433b84

Plugin Details

Severity: High

ID: 107197

File Name: quest_dr_series_web_default_creds.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 3/8/2018

Updated: 2/16/2022

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score from an in depth analysis done by tenable

CVSS v2

Risk Factor: High

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: High

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Vulnerability Information

Required KB Items: installed_sw/Quest DR Series Appliance

Excluded KB Items: global_settings/supplied_logins_only