Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Adobe Document Server Default Credentials


Vulnerability Assessment Details

Adobe Document Server Default Credentials

Vulnerability Assessment Summary
Checks for default credentials in Adobe Document Server

Detailed Explanation for this Vulnerability Assessment

Summary :

The administration console for the remote web server is protected with
default credentials.

Description :

The remote host is running Adobe Document Server, a server that
dynamically creates and manipulates PDF documents as well as graphic
images.

The installation of Adobe Document Server on the remote host uses the
default username and password to control access to its administrative
console. Knowing these, a possible hacker can gain control of the affected
application.

Solution :

Login via the administration interface and change the password for the
admin account.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

2.5" SATA HARD DRIVE / SSD TO USB 3.0 ADAPTER CABLE FOR PC/MAC
$12.98
2.5Lite-ON WKJR2 LCM-256M3S 256GB 2.5" SATA 6.0Gbp/S Solid State Drive
$19.9
Lite-ON WKJR2 LCM-256M3S 256GB 2.5USED INTERNAL 2.5" SAMSUNG 64GB SATA 3.0Gbps SOLID STATE DRIVE(SSD) MMCRE64G5MXP
$14.0
USED INTERNAL 2.5SanDisk Extreme 500GB Portable SSD External Drive 550MB/s -- Brand NEW & Sealed
$86.95
SanDisk Extreme 500GB Portable SSD External Drive 550MB/s -- Brand NEW & Sealed picture


Discussions

No Discussions have been posted on this vulnerability.