Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

TELNET:USER:APC-BACKDOOR

Severity

High

Recommended

No

Recommended Action

Drop

Category

TELNET

Keywords

APC Backdoor Login Attempt

Release Date

2004/02/18

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

TELNET: APC Backdoor Login Attempt


This signature detects attempts to exploit a known vulnerability in an American Power Conversion (APC) Universal Power Supply (UPS) or SmartSwitch device. Attackers can login to an APC UPS or SmartSwitch device using a backdoor password, then determine the login credentials of any user to gain full administrative access to the device.

Extended Description

APC SmartSlot Web/SNMP Management Card has been reported prone to a default password vulnerability. This password is reportedly used during initial card configuration, prior to public distribution. It has been reported that an attacker may access any of the affected services, if they are available, by using the default password. The impact of this issue may be exaggerated if the same authentication credentials are used to access multiple hosts.

Affected Products

  • APC WEB/SNMP Management Card (9606) Firmware 3.0.0
  • APC WEB/SNMP Management Card (9606) Firmware 3.0.1

References

  • BugTraq: 9681
  • CVE: CVE-2004-0311
  • URL: http://www.securityfocus.com/archive/1/354169/2004-02-15/2004-02-21/0
  • URL: http://www.securitytracker.com/alerts/2004/Feb/1009090.html
  • URL: http://www.securityspace.com/smysecure/catid.html?viewsrc=1&id=12066

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out