Overview
There is a vulnerability in the Beck IPC@CHIP that may allow an attacker to gain access to the device.
Description
The Beck IPC@CHIP is a single chip embedded webserver. This device also contains a telnet server that ships with an account named "Default". This account essentially grants the user superuser privileges on the device. This account also (by default) does not have a "strong" password (it can be easily guessed and is publicly available). As a result, an attacker can easily guess the password or apply a brute-force password attack and perhaps gain entry to the device. |
Impact
An attacker can connect to the telnet service and make use of a brute-force password attack and perhaps gain entry to the device. |
Solution
Change the default settings on the telnet server so that there is no "Default" account. |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was discovered by Sentry Research Labs.
This document was written by Ian A. Finlay.
Other Information
| CVE IDs: | None |
| Severity Metric: | 5.82 |
| Date Public: | 2001-05-24 |
| Date First Published: | 2001-09-27 |
| Date Last Updated: | 2001-09-27 18:10 UTC |
| Document Revision: | 19 |