Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
SSH Brute Force Logins With Default Credentials Reporting
Information
Severity
Severity
High
Family
Family
Default Accounts
CVSSv2 Base
CVSSv2 Base
7.5
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
Mitigation
Created
Created
7 years ago
Modified
Modified
5 years ago
Summary
It was possible to login into the remote SSH server using default credentials. As the NVT 'SSH Brute Force Logins with default Credentials' (OID: 1.3.6.1.4.1.25623.1.0.108013) might run into a timeout the actual reporting of this vulnerability takes place in this NVT instead. The script preference 'Report timeout' allows you to configure if such an timeout is reported.
Detection Method
Detection Method
Try to login with a number of known default credentials via the SSH protocol.
Solution
Solution
Change the password as soon as possible.