APP: Arkeia Network Backup Default Password

This signature detects attempts to connect to the Arkeia Network Backup Agent file system with the default username and password. Several incidences of this signature can indicate that attackers are proactively attempting to exploit the numerous vulnerabilities in this software.

Extended Description

The Knox Arkeia Server is prone to a remotely exploitable stack-based buffer overrun. The issue occurs because the software fails to do sufficient bounds checking when handling data contained within a type 77 request packet. A remote attacker may leverage this issue to execute arbitrary code in the context of the vulnerable service.

Affected Products

Knox_software arkeia

Short Name
APP:ARKEIA:DEFAULT-PASSWORD
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Arkeia Backup CVE-2005-0496 Default Network Password bid:12594
Release Date
02/23/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/617
False Positive
Unknown
Vendors

Knox_software

CVSS Score

7.5

Found a potential security threat?