Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> F5 Device Default Support Password


Vulnerability Assessment Details

F5 Device Default Support Password

Vulnerability Assessment Summary
F5 Device Default Support Password

Detailed Explanation for this Vulnerability Assessment


This F5 Networks system still has the default
password set for the support user account. This
account normally provides read/write access to the
web configuration utility. A possible hacker could take
advantage of this to reconfigure your systems and
possibly gain shell access to the system with
super-user rights.

Solution: Remove the support account entirely or
change the password of this account to something
that is difficult to guess.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Digital Defense Inc.

Cables, Connectors

Entry-Level DELL PE R620 Server 2x 2.00Ghz E5-2620 6C 72GB 2x 146GB 15K SAS
$1335.4
Entry-Level DELL PE R620 Server 2x 2.00Ghz E5-2620 6C 72GB 2x 146GB 15K SAS pictureDELL PowerEdge R620 2x 2.60Ghz E5-2670 8 Core 96GB
$1384.95
DELL PowerEdge R620 2x 2.60Ghz E5-2670 8 Core 96GB pictureDELL PowerEdge R620 2x 2.60Ghz E5-2670 8 Core 16GB 4x 300GB SSD
$2525.25
DELL PowerEdge R620 2x 2.60Ghz E5-2670 8 Core 16GB 4x 300GB SSD pictureMicrosoft SQL SERVER 2000 Standard Edition
$20.0
Microsoft SQL SERVER 2000 Standard Edition picture


Discussions

No Discussions have been posted on this vulnerability.