Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.808238 |
Categoría: | Web application abuses |
Título: | EdgeCore ES3526XA Manager Multiple Vulnerabilities |
Resumen: | This host is installed with EdgeCore; ES3526XA Manager and is prone to multiple vulnerabilities. |
Descripción: | Summary: This host is installed with EdgeCore ES3526XA Manager and is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws are due to: - No CSRF Token is generated per page and / or per (sensitive) function - An improper access control mechanism so that any functions can be performed by directly calling the function URL (GET/POST) without any authentication - It is possible to login with default credential admin:admin or guest:guest, and mandatory password change is not enforced by the application Vulnerability Impact: Successful exploitation will allow remote attackers silent execution of unauthorized actions on the device such as password change, configuration parameter changes, to bypass authentication and to perform any administrative functions such as add, update, delete users. Affected Software/OS: EdgeCore - Layer2+ Fast Ethernet Standalone Switch ES3526XA Manager. Please see the referenced link for the affected switch information. Solution: No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. CVSS Score: 8.5 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:P/A:N |
Copyright | Copyright (C) 2016 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |