Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> F5 Device Default Support Password


Vulnerability Assessment Details

F5 Device Default Support Password

Vulnerability Assessment Summary
F5 Device Default Support Password

Detailed Explanation for this Vulnerability Assessment


This F5 Networks system still has the default
password set for the support user account. This
account normally provides read/write access to the
web configuration utility. A possible hacker could take
advantage of this to reconfigure your systems and
possibly gain shell access to the system with
super-user rights.

Solution: Remove the support account entirely or
change the password of this account to something
that is difficult to guess.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Digital Defense Inc.

Cables, Connectors

32GB 32G Cartoon Animal Shark Fish Shape Gift USB Flash Drive USB Flash Disk Pen
$18.27
32GB 32G Cartoon Animal Shark Fish Shape Gift USB Flash Drive USB Flash Disk Pen pictureIntegral 8GB Neon USB 3.0 Flash Drive in Orange - Up To 10X Faster Than usb 2.0
$14.3
Integral 8GB Neon USB 3.0 Flash Drive in Orange - Up To 10X Faster Than usb 2.0 pictureLot 32GB 32G USB 3.0 Super Fast Flash Memory Drive Storage Thumb Pen Stick - US
$10.99
Lot  32GB 32G USB 3.0 Super Fast Flash Memory Drive Storage Thumb Pen Stick - US pictureLot 32GB 32G USB 3.0 Super Fast Flash Memory Drive Storage Thumb Pen Stick - US
$10.99
Lot  32GB 32G USB 3.0 Super Fast Flash Memory Drive Storage Thumb Pen Stick - US picture


Discussions

No Discussions have been posted on this vulnerability.