Overview
There is a vulnerability in the Beck IPC@CHIP that may allow an attacker to gain access to the device.
Description
The Beck IPC@CHIP is a single chip embedded webserver. This device also contains a telnet server that ships with an account named "Default". This account essentially grants the user superuser privileges on the device. This account also (by default) does not have a "strong" password (it can be easily guessed and is publicly available). As a result, an attacker can easily guess the password or apply a brute-force password attack and perhaps gain entry to the device. |
Impact
An attacker can connect to the telnet service and make use of a brute-force password attack and perhaps gain entry to the device. |
Solution
Change the default settings on the telnet server so that there is no "Default" account. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was discovered by Sentry Research Labs.
This document was written by Ian A. Finlay.
Other Information
CVE IDs: | None |
Severity Metric: | 5.82 |
Date Public: | 2001-05-24 |
Date First Published: | 2001-09-27 |
Date Last Updated: | 2001-09-27 18:10 UTC |
Document Revision: | 19 |