TELNET: APC Backdoor Login Attempt

This signature detects attempts to exploit a known vulnerability in an American Power Conversion (APC) Universal Power Supply (UPS) or SmartSwitch device. Attackers can login to an APC UPS or SmartSwitch device using a backdoor password, then determine the login credentials of any user to gain full administrative access to the device.

Extended Description

APC SmartSlot Web/SNMP Management Card has been reported prone to a default password vulnerability. This password is reportedly used during initial card configuration, prior to public distribution. It has been reported that an attacker may access any of the affected services, if they are available, by using the default password. The impact of this issue may be exaggerated if the same authentication credentials are used to access multiple hosts.

Affected Products

Apc web/snmp_management_card_(9606)_firmware

Short Name
TELNET:USER:APC-BACKDOOR
Severity
Major
Recommended
False
Recommended Action
Drop
Category
TELNET
Keywords
APC Attempt Backdoor CVE-2004-0311 Login bid:9681
Release Date
02/19/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Apc

CVSS Score

10.0

Found a potential security threat?