HTTP: 3com RAS 1500 Configuration Request

This signature detects attempts to exploit a known vulnerability in 3com SuperStack II Remote Access System (RAS) 1500. Attackers can request the 3comRAS server device configuration file, decrypt the encoded password in the configuration file, and gain elevated access.

Extended Description

Successful exploitation of the vulnerability in the SuperStack II RAS 1500 router could allow a remote attacker to deny service to the router, or to obtain its configuration and system image file. A firmware update is needed to eliminate this vulnerability.

Short Name
HTTP:MISC:RAS-CFG
Severity
Warning
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
1500 3com Configuration RAS Request
Release Date
05/29/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown

Found a potential security threat?