APP: Symantec Messaging Gateway Default SSH Password

This signature detects attempts to exploit a known vulnerability against Symantec Messaging Gateway. It is due to the use of hardcoded default credentials. It can result in privilege escalation. To exploit the vulnerability, an attacker must have access to the Symantec Messaging Gateway management interface.

Extended Description

Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session.

Affected Products

Symantec messaging_gateway

Short Name
APP:SYMC:MESSAGING-SSH-PASSWORD
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2012-3579 Default Gateway Messaging Password SSH Symantec bid:55143
Release Date
09/17/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3723
False Positive
Unknown
Vendors

Symantec

CVSS Score

7.9

Found a potential security threat?