Summary
The remote terminal server has the default password set.
This means that anyone who has (downloaded) a user manual can telnet to it and gain administrative access.
If modems are attached to this terminal server, it may allow unauthenticated remote access to the network.
Solution
Telnet to this terminal server change to the root
user with 'su' and set the password with the 'passwd' command.
Then, go to the admin mode using the 'admin' command. Cli security can then be enabled by setting the vcli_security to 'Y' with the command 'set annex vcli_security Y'. This will require ERPCD or RADIUS authentication for access to the terminal server. Changes can then be applied through the 'reset annex all' command.
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Adobe Flash Media Server Multiple Remote Security Vulnerabilities
- Adobe Acrobat Multiple Unspecified Vulnerabilities -01 Feb13 (Mac OS X)
- Adobe AIR Security Bypass Vulnerability Jan14 (Windows)
- Adobe AIR Multiple Vulnerabilities -02 April 13 (Mac OS X)
- Adobe AIR Multiple Vulnerabilities-01 Sep14 (Mac OS X)