Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Sitecom Devices Hard-coded credentials
Information
Severity
Severity
Critical
Family
Family
Default Accounts
CVSSv2 Base
CVSSv2 Base
10.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
10 years ago
Modified
Modified
5 years ago
Summary
The remote Sitecom Device is prone to a hard-coded credentials bypass vulnerability
Insight
Insight
A user can login to the Telnet service (with root privileges) using the hard-coded credential admin:1234. This administrative account is hard-coded and cannot be changed by a normal user.
Detection Method
Detection Method
Start a telnet session with the hard-coded credentials.
Solution
Solution
Updates are available.