Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> F5 Device Default Support Password


Vulnerability Assessment Details

F5 Device Default Support Password

Vulnerability Assessment Summary
F5 Device Default Support Password

Detailed Explanation for this Vulnerability Assessment


This F5 Networks system still has the default
password set for the support user account. This
account normally provides read/write access to the
web configuration utility. A possible hacker could take
advantage of this to reconfigure your systems and
possibly gain shell access to the system with
super-user rights.

Solution: Remove the support account entirely or
change the password of this account to something
that is difficult to guess.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Digital Defense Inc.

Cables, Connectors

Dell R630 8-Core Server 1x E5-2630 v3 2.4GHz 24GB H730 8x 960GB SSD
$4708.0
Dell R630 8-Core Server 1x E5-2630 v3 2.4GHz 24GB H730 8x 960GB SSD pictureDell R630 8-Core Server 2x E5-2623 v3 3.0GHz 16GB 4x 480GB SSD
$2406.0
Dell R630 8-Core Server 2x E5-2623 v3 3.0GHz 16GB 4x 480GB SSD pictureDell R630 16-Core Server 2x E5-2630 v3 2.4GHz 64GB H730 8x 480GB SSD iDRAC Rails
$4715.0
Dell R630 16-Core Server 2x E5-2630 v3 2.4GHz 64GB H730 8x 480GB SSD iDRAC Rails pictureDell R630 16-Core Server 2x E5-2630 v3 2.4GHz 16GB H730 8x 300GB iDRAC Rails RPS
$3084.0
Dell R630 16-Core Server 2x E5-2630 v3 2.4GHz 16GB H730 8x 300GB iDRAC Rails RPS picture


Discussions

No Discussions have been posted on this vulnerability.