Synopsis
The remote server uses known authentication credentials.
Description
The remote host is running Symantec's Brightmail Control Center, a web-based administration tool for Brightmail AntiSpam.
The installation of Brightmail Control Center on the remote host still has an account 'admin' with the default password 'symantec'. An attacker can exploit this issue to gain access of the Control Center and any scanners it controls.
Solution
Log in to the Brightmail Control Center and change the password for the 'admin' user.
Plugin Details
File Name: brightmail_antispam_default_password.nasl
Supported Sensors: Nessus
Vulnerability Information
Excluded KB Items: global_settings/supplied_logins_only