This vulnerability is 15 years 9 months and 28 days old there are exploits publicly available for it. The vulnerability itself is over a year old, and with there being exploits publicly available it is highly advisable that this vulnerability is patched immediately.
SynopsisThe remote host has a default password enabled and is vulnerability to basic attacks and malware such as the W32/Deloder worm.
During the testing, we were able to connect to this host with one of these credentials. The poses a number of risks:
- The worm W32/Deloder may use it to break into the remote host and upload infected data in the remote shares.
- Any number of current crypto miner malware strains currently use default passwords lists and may break into the remote host and misuse the CPU or GPU resources.
- An attacker may connect and hold the machine to ransom or use it as a gateway into the connected networks.
SolutionChange your administrator password to a strong one.
CVE ReferencesNIST | MITRE | CVEDetails
Get in touch
Should you have any questions regarding this or any security matter, please do not hesitate to get in touch by emailing the Hedgehog Cyber Operations Team.
Whilst every effort is made to ensure the accuracy and robustness of any information presented, it is not possible for Hedgehog Cyber to test every possible scenario an organisation may face, and Hedgehog Cyber cannot be held liable for any loss or damage which may arise from taking action on any of the contents provided. Hedgehog Cyber strongly advises that all recommendations, solutions and detection methods detailed, are thoroughly reviewed and tested in non-production environments before being considered suitable for production release, in-line with any existing internal change control procedures.