Vulnerabilities > CVE-2004-0311 - Unspecified vulnerability in APC Ap9606 3.0/3.0.1

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
apc
critical
nessus

Summary

American Power Conversion (APC) Web/SNMP Management SmartSlot Card 3.0 through 3.0.3 and 3.21 are shipped with a default password of TENmanUFactOryPOWER, which allows remote attackers to gain unauthorized access.

Vulnerable Configurations

Part Description Count
Hardware
Apc
2

Nessus

  • NASL familySNMP
    NASL idSNMP_DEFAULT_COMMUNITIES.NASL
    descriptionIt is possible to obtain the default community names of the remote SNMP server. An attacker can use this information to gain more knowledge about the remote host or to change the configuration of the remote system (if the default community allows such modifications).
    last seen2020-06-01
    modified2020-06-02
    plugin id10264
    published2002-11-25
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10264
    titleSNMP Agent Default Community Names
  • NASL familyMisc.
    NASL idAPC_SMARTSLOT_FACTORY_PASSWORD.NASL
    descriptionThe remote APC Smartslot Web/SNMP Management card ships with a default username and password. An attacker can use this information to access the remote APC device with any username and the factory password
    last seen2020-06-01
    modified2020-06-02
    plugin id12066
    published2004-02-18
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/12066
    titleAPC SmartSlot Web/SNMP Management Card Default Password