#VU45063 Credentials management in WebDefend


Published: 2011-05-05 | Updated: 2020-08-11

Vulnerability identifier: #VU45063

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-0756

CWE-ID: CWE-255

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
WebDefend
Other software / Other software solutions

Vendor: Trustwave

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The application server in Trustwave WebDefend Enterprise before 5.0 uses hardcoded console credentials, which makes it easier for remote attackers to read security-event data by using the remote console GUI to connect to the management port.

Mitigation
Install update from vendor's website.

Vulnerable software versions

WebDefend: 2.0


External links
http://securitytracker.com/id?1025447
http://www.trustwave.com/spiderlabs/advisories/TWSL2011-001.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability