Executive Summary
Summary | |
---|---|
Title | Dell KACE K2000 Appliance contains backdoor administrator account |
Informations | |||
---|---|---|---|
Name | VU#135606 | First vendor Publication | 2011-11-08 |
Vendor | VU-CERT | Last vendor Modification | 2011-11-08 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#135606Dell KACE K2000 Appliance contains backdoor administrator accountOverviewThe Dell KACE K2000 System Deployment Appliance contains a hidden administrator account that could allow a remote attacker to take control of an affected device.I. DescriptionThe Dell KACE K2000 Deployment Appliance is an integrated systems provisioning product for large-scale operating systems deployment. Some versions of the product contain a backdoor administrator account with a fixed password, accessible via the administrative web interface of the device. Furthermore, the backdoor account is not visible from, and cannot be removed via the appliance's administrative web interface.II. ImpactA remote attacker could login to an affected device with administrative privileges. Secondary impacts include: the ability to make configuration changes, modification of existing deployment/recovery images, access to sensitive information, and the ability to mount further attacks (e.g., execute arbitrary commands with elevated privileges).III. SolutionWe are currently unaware of a practical solution to this problem.Vendor Information
Referenceshttp://www.kace.com/support/kb/index.php?action=artikel&id=1120&artlang=en CreditThanks to Tenable Network Security for reporting this vulnerability. This document was written by Chad Dougherty. Other Information
|
Original Source
Url : http://www.kb.cert.org/vuls/id/135606 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Hardware | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2011-11-11 | Name : Dell KACE K2000 Backdoor File : nvt/gb_dell_kace_2000_backdoor.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76939 | Dell KACE K2000 System Deployment Appliance Backdoor Admin Account |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-02-10 | Name : The system deployment appliance detected on the remote host is affected by mu... File : dell_kace_k2000_3_3_52857.nasl - Type : ACT_GATHER_INFO |
2011-11-09 | Name : It is possible to log into the remote web application by using a hidden account. File : dell_kace_web_backdoor.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:07:31 |
|