7.5
CVSSv2

CVE-2009-0695

Published: 19/06/2012 Updated: 26/06/2012
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

hagent.exe in Wyse Device Manager (WDM) 4.7.x does not require authentication for commands, which allows remote malicious users to obtain management access via a crafted query, as demonstrated by a V52 query that triggers a power-off action.

Vulnerable Product Search on Vulmon Subscribe to Product

dell wyse device manager 4.7.1

dell wyse device manager 4.7.2

dell wyse device manager 4.7.0

Exploits

require 'msf/core' class Metasploit3 < Msf::Auxiliary Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp include Msf::Auxiliary::Dos def initialize(info = {}) super(update_info(info, 'Name' => 'Wyse Machine Remote Power off (DOS)', 'Description' => %q{ This module exploits the Wyse Rapport Hagent ser ...
## # $Id: hagent_untrusted_hsdatarb 10998 2010-11-11 22:43:22Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'timeout' ...