Auerswald COMsuite/ Back Door

Risk: Medium
Local: Yes
Remote: Yes

CVSS Base Score: 4.6/10
Impact Subscore: 6.4/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

------------------------------------------------------------------------ SySS-Advisory: Auerswald COMsuite/ Back Door DATE: April 16th 03 (Published 29th April 03) AUTHOR: Sebastian Schreiber <Schreiber (at) SySS (dot) de [email concealed]> SySS GmbH 72070 Tbingen / Germany Tel.: +49-7071-407856-0 AFFECTED SYSTEMS: Auerswald COMsuite CTI ControlCenter 3,1,2001,6 (also known as: 3.1 06/2001) (see: DESCRIPTION: If you install the CTI applicaton "Auerswald COMsuite CTI Control Center" a user "runasositron" is created. The user's password is known by SySS and very easy to guess (using L0phtCrack for example). IMPACT: This account can be used locally and remotely to access the Windows PC on which COMsuite is installed. WORKAROUND: Deactivate the user. CTI still works. VENDOR STATUS: Auerswald has been contacted on April 15th 2003. Auerswald told me that deactivating the account might disable fax/voice mail if nobody is logged on. Best regards, Dipl.-Inform. Pierre Kroma Security Consultant ======================================================== SySS GmbH 72070 Tbingen Germany Voice: ++49 7071-407856-0 mailto: Kroma (at) syss (dot) de [email concealed] Key fingerprint = 927A B13E 16F5 BBAB 8F17 75EB D8E1 A9A4 F257 4EEC

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top