Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Compaq Web-based Management Login

Information

Severity

Severity

High

Family

Family

Default Accounts

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Mitigation

Created

Created

18 years ago

Modified

Modified

5 years ago

Summary

Checks the administrator account on Compaq Web-based Management / HP System Management agents for the default or predictable passwords.

Insight

Insight

The Compaq Web-based Management / HP System Management Agent active on the remote host is configured with the default, or a predictable, administrator password. Depending on the agents integrated, this allows an attacker to view sensitive and verbose system information, and may even allow more active attacks such as rebooting the remote system. Furthermore, if an SNMP agent is configured on the remote host it may disclose the SNMP community strings in use, allowing an attacker to set device configuration if the 'write' community string is uncovered. To manually test for this bug, you can log into the Compaq web server via a browser (https://example.com:2381/). Log in with a username/password combination of administrator/

Solution

Solution

Ensure that all passwords for Compaq Web-based Management / HP System Management Agent accounts are set to stronger, less easily guessable, alternatives. As a further precaution, use the 'IP Restricted Logins' setting to allow only authorised IP's to manage this agent.