|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Misc. >> Bay Networks Accelar 1200 Switch found with default password Vulnerability Assessment Details
|
Bay Networks Accelar 1200 Switch found with default password |
||
Logs into Bay Networks switches with default password Detailed Explanation for this Vulnerability Assessment The remote host appears to be an Bay Networks Accelar 1200 Switch with its default password set. The attacker could use this default password to gain remote access to your switch. This password could also be potentially used to gain other sensitive information about your network from the switch. Solution : Telnet to this switch and change the default password. Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Charles Thier |
||
Cables, Connectors |
Cisco Systems NCS2K-20-SMRFS-L optical multiplexor CISCO EXCESS
$3599.00
Cisco SG110 24 Port Gigabit Ethernet Switch w/ 2 x SFP SG110-24
$117.00
Cisco 1100 Terminal - gateway - rack-mountable C1100TGX-1N24P32A
$1349.00
Cisco WS-C3850-48P-L 48-Port Gigabit 3850 PoE Switch w/ 715W+ C3850-NM-4-1G Mod
$83.00
Cisco CBS350-24FP-4G 28 Port PoE Managed Ethernet Switch
$319.99
Cisco C3850-NM-2-10G 2 Port Network Exp.Module for 3850
$38.99
Lot of 4 Cisco QSFP-40G-SR-BD 10-2945-02 Transceiver Modules Hologram
$47.99
Cisco C9200 48-Port Gigabit Network Switch With Ears P/N: C9200-48T-E Dual Power
$799.97
New Cisco C9200-NM-4X Catalyst 9200 Series Network Module 4 X 10GE *MINT*
$429.97
|
||
No Discussions have been posted on this vulnerability. |