Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> ICEcap default password


Vulnerability Assessment Details

ICEcap default password

Vulnerability Assessment Summary
logs into the remote ICEcap subsystem

Detailed Explanation for this Vulnerability Assessment

The ICEcap package has a default login
of 'iceman' with no password.

A possible hacker may use this fact to log into
the console and/or push false alerts
on port 8082.

In addition to this, a possible hacker may inject code
in ICEcap v2.0.23 and below.


Solution : Set a password. If you are running version <= 2.0.23
of ICEcap, go to http://advice.networkice.com/advice/Support/KB/q000166/
Network Security Threat Level: High

Networks Security ID: 1216

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Renaud Deraison

Cables, Connectors

Linux Security Red Hat Cert of Expertise in Server Hardening EX413 & LPIC-3 303
$6.99
Linux Security Red Hat Cert of Expertise in Server Hardening EX413 & LPIC-3 303  pictureLinux Installer on USB 2.0 Flash Drive - Fedora 26 Server + Workstation (64 bit)
$9.49
Linux Installer on USB 2.0 Flash Drive - Fedora 26 Server + Workstation (64 bit) pictureUbuntu Installer on USB 2.0 Flash Drive - Desktop + Server 17.04 (64 bit)
$8.95
Ubuntu Installer on USB 2.0 Flash Drive - Desktop + Server 17.04 (64 bit) pictureUbuntu Installer on USB 2.0 Flash Drive - Desktop + Server 16.04 LTS (64 bit)
$8.95
Ubuntu Installer on USB 2.0 Flash Drive - Desktop + Server 16.04 LTS (64 bit) picture


Discussions

No Discussions have been posted on this vulnerability.