4
CVSSv2

CVE-2012-4362

Published: 20/08/2012 Updated: 21/08/2012
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
VMScore: 410
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Vulnerability Summary

hydra.exe in HP SAN/iQ prior to 9.5 on the HP Virtual SAN Appliance has a hardcoded password of L0CAlu53R for the global$agent account, which allows remote malicious users to obtain access to a management service via a login: request to TCP port 13838.

Vulnerable Product Search on Vulmon Subscribe to Product

hp san\\/iq 9.5

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking ...
#!/usr/bin/python ''' ================================== Pseudo documentation ================================== ''' # HP VSA / SANiQ Hydra client # Nicolas Grégoire <nicolasgregoire@agarrifr> # v05 ''' ================================== Target information ================================== ''' HOST = '192168201 ...