AirConnect Default Password

high Nessus Plugin ID 10961

Synopsis

It is possible to access the remote wireless access point with default credentials.

Description

This AirConnect wireless access point still has the default password set for the web interface. This could be abused by an attacker to gain full control over the wireless network settings.

Solution

Change the password to something difficult to guess via the web interface.

Plugin Details

Severity: High

ID: 10961

File Name: DDI_AirConnect_Default_Password.nasl

Version: 1.21

Type: remote

Family: Misc.

Published: 5/22/2002

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 9/12/2002

Exploitable With

Metasploit (SNMP Community Scanner)

Reference Information

CVE: CVE-1999-0508