Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Compaq Web-based Management Login
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Checks the administrator account on Compaq Web-based Management / HP System Management agents for the default or predictable passwords.
Insight
Insight
The Compaq Web-based Management / HP System Management Agent active on the remote host is configured with the default, or a predictable, administrator password. Depending on the agents integrated, this allows an attacker to view sensitive and verbose system information, and may even allow more active attacks such as rebooting the remote system. Furthermore, if an SNMP agent is configured on the remote host it may disclose the SNMP community strings in use, allowing an attacker to set device configuration if the 'write' community string is uncovered. To manually test for this bug, you can log into the Compaq web server via a browser (https://example.com:2381/). Log in with a username/password combination of administrator/
Solution
Solution
Ensure that all passwords for Compaq Web-based Management / HP System Management Agent accounts are set to stronger, less easily guessable, alternatives. As a further precaution, use the 'IP Restricted Logins' setting to allow only authorised IP's to manage this agent.