Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> ICEcap default password


Vulnerability Assessment Details

ICEcap default password

Vulnerability Assessment Summary
logs into the remote ICEcap subsystem

Detailed Explanation for this Vulnerability Assessment

The ICEcap package has a default login
of 'iceman' with no password.

A possible hacker may use this fact to log into
the console and/or push false alerts
on port 8082.

In addition to this, a possible hacker may inject code
in ICEcap v2.0.23 and below.


Solution : Set a password. If you are running version <= 2.0.23
of ICEcap, go to http://advice.networkice.com/advice/Support/KB/q000166/
Network Security Threat Level: High

Networks Security ID: 1216

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Renaud Deraison

Cables, Connectors

Microsoft Surface Pro 4 256GB 8 GB RAM.
$900.0
Microsoft Surface Pro 4 256GB 8 GB RAM. picturePC2-6400U-666-12-ZZ M378T2863EHS-CF7 1GBx2 Samsung RAM
$5.0
PC2-6400U-666-12-ZZ M378T2863EHS-CF7 1GBx2 Samsung RAM pictureApple iMac 21.5inch 2.7GHz Core i5 2TB 4GB RAM (Mid-2011) #10937
$275.11
Apple iMac 21.5inch 2.7GHz Core i5 2TB 4GB RAM (Mid-2011) #10937 pictureKingston Tech HyperX Impact 16GB 2133MHz DDR4 CL13 260-Pin SODIMM HX421S13IB/16
$180.84
Kingston Tech HyperX Impact 16GB 2133MHz DDR4 CL13 260-Pin SODIMM HX421S13IB/16 picture


Discussions

No Discussions have been posted on this vulnerability.