Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> US Robotics Disclosed Password Check


Vulnerability Assessment Details

US Robotics Disclosed Password Check

Vulnerability Assessment Summary
US Robotics Password Check

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is affected by an information disclosure issue.

Description :

The remote host appears to be a US Robotics Broadband router.

The device's administrator password is stored as plaintext in a
Javascript function in the file '/menu.htm', which can be viewed by
anyone.

See also :

http://archives.neohapsis.com/archives/bugtraq/2004-06/0109.html

Solution:

Disable the webserver or filter the traffic to the webserver via an
upstream firewall.

Network Security Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 10490

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Intel Xeon E5-1620V2, 3.7 ghz., 10MB, (SR1AR)
$95.0
Intel Xeon E5-1620V2, 3.7 ghz., 10MB,  (SR1AR) pictureHP DL380 G9 8 Bay 1 X E5-2620 V3 H240AR 8GB RAM 2 X 146GB 15K SAS Single PS
$2250.0
HP DL380 G9 8 Bay 1 X E5-2620 V3 H240AR 8GB RAM 2 X 146GB 15K SAS Single PS  pictureMac Pro 12-core Intel Xeon
$750.0
Mac Pro 12-core Intel Xeon    pictureHP DL380 G9 8 Bay 1 X 146GB 15K SAS 96GB RAM 1 X E5-2620 V3 H240AR Single PS
$2875.0
HP DL380 G9 8 Bay 1 X 146GB 15K SAS 96GB RAM 1 X E5-2620 V3 H240AR Single PS  picture


Discussions

No Discussions have been posted on this vulnerability.