Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Aastra OpenCom 1000 Default Login
Information
Severity
Severity
High
Family
Family
Default Accounts
CVSSv2 Base
CVSSv2 Base
7.5
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
Mitigation
Created
Created
11 years ago
Modified
Modified
5 years ago
Summary
The remote Aastra OpenCom 1000 is prone to a default account authentication bypass vulnerability. This issue may be exploited by a remote attacker to gain access to sensitive information or modify system configuration without requiring authentication. It was possible to login as user 'Admin' with password 'Admin'.
Solution
Solution
Change the password.