Lucene search

K
openvasCopyright (C) 1999 AnonymousOPENVAS:136141256231012641
HistoryNov 03, 2005 - 12:00 a.m.

Pirelli AGE mB Router Default Password (Telnet)

2005-11-0300:00:00
Copyright (C) 1999 Anonymous
plugins.openvas.org
60

9.9 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.7%

The remote host is a Pirelli AGE mB (microBusiness) router with its
default password set (admin/microbusiness).

# SPDX-FileCopyrightText: 1999 Anonymous
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.12641");
  script_version("2023-08-01T13:29:10+0000");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-1999-0501", "CVE-1999-0502", "CVE-1999-0507", "CVE-1999-0508");
  script_name("Pirelli AGE mB Router Default Password (Telnet)");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 1999 Anonymous");
  script_family("Default Accounts");
  script_dependencies("telnetserver_detect_type_nd_version.nasl", "gb_default_credentials_options.nasl");
  script_require_ports("Services/telnet", 23);
  script_mandatory_keys("telnet/banner/available");
  script_exclude_keys("default_credentials/disable_default_account_checks");

  script_tag(name:"solution", value:"Telnet to this router and set a password immediately.");

  script_tag(name:"summary", value:"The remote host is a Pirelli AGE mB (microBusiness) router with its
  default password set (admin/microbusiness).");

  script_tag(name:"impact", value:"An attacker could telnet to it and reconfigure it to lock the owner out
  and to prevent him from using his Internet connection, and do bad things.");

  script_tag(name:"solution_type", value:"Mitigation");
  script_tag(name:"qod_type", value:"remote_vul");

  exit(0);
}

include("default_account.inc");
include("telnet_func.inc");
include("misc_func.inc");
include("port_service_func.inc");
include("dump.inc");

# If optimize_test = no
if( get_kb_item( "default_credentials/disable_default_account_checks" ) ) exit( 0 );

port = telnet_get_port( default:23 );

banner = telnet_get_banner( port:port );
if( ! banner || "USER:" >!< banner ) exit( 0 );

soc = open_sock_tcp( port );
if( soc ) {

  r = recv_until( socket:soc, pattern:"(USER:|ogin:)" );
  if ( "USER:" >!< r ) {
    close( soc );
    exit( 0 );
  }

  s = string( "admin\r\nmicrobusiness\r\n" );
  send( socket:soc, data:s );
  r = recv_until( socket:soc, pattern:"Configuration" );
  close( soc );

  if( r && "Configuration" >< r ) {
    security_message( port:port );
    exit( 0 );
  }
}

#Second try as User (reopen soc because wrong pass disconnect)
soc = open_sock_tcp( port );
if( soc ) {

  r = recv_until( socket:soc, pattern:"(USER:|ogin:)" );
  if ( "USER:" >!< r ) {
    close( soc );
    exit( 0 );
  }

  s = string( "user\r\npassword\r\n" );
  send( socket:soc, data:s );
  r = recv_until( socket:soc, pattern:"Configuration" );
  close( soc );

  if( r && "Configuration" >< r ) {
    security_message( port:port );
  }
}

exit( 0 );

9.9 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.7%

Related for OPENVAS:136141256231012641