CVE-2002-1691 (CNNVD-200212-817)
中文标题:
Alcatel OmniPCX系统缺省口令漏洞
英文标题:
Alcatel OmniPCX 4400 installs known user accounts and passwords in the /etc/password file by default...
漏洞描述
中文描述:
OmniPCX是企业级的Personal Communications Exchange (PCX)系统,由Alcatel负责维护开发。 OmniPCX系统在安装过程中没有提示用户修改各种缺省口令。而OmniPCX系统缺省情况下开放了很多服务,比如telnet、ftp,于是潜在存在安全问题。 缺省/etc/passwd文件如下 root:.Zn2PprVBQWI2:0:1:0000-Admin(0000):/:/chbin/sh halt:xY3mcbaFNyp0k:0:1:0000-Admin(0000):/usr/halt:/chbin/sh daemon:*:1:1:0000-Admin(0000):/: bin:*:2:2:0000-Admin(0000):/bin: sys:*:3:3:0000-Admin(0000):/usr: adm:*:4:4:0000-Admin(0000):/usr/adm: sync::67:1:0000-Admin(0000):/:/bin/sync install:yYV3uyxkFX8bc:101:1:Initial Login:/usr/install:/chbin/sh kermit:zYBmh/woCrN6E:102:1:kermit:/usr/kermit:/chbin/sh swinst::0:1:installation-account:/usr/swinst:/chbin/sh mtch:aUi5.tLxc7zRc:2010:20:mtch:/DHS3bin/mtch:/chbin/ksh mtcl:bUAp.LcUa4SIo:2011:20:mtcl:/DHS3bin/mtcl:/chbin/ksh dhs3pms:cUlGakVr1CAkE:2013:20:dhs3pms:/DHS3bin/dhs3pms:/chbin/sh adfexc:dUHpLtTswZu/Q:2015:20:adfexc:/DHS3bin/adfexc:/chbin/sh pcmao::2012:20:pcmao:/DHS3bin/mao:/chbin/sh nmcmao:gUvHzOAi7wETE:2016:20:nmcmao:/DHS3bin/nmcmao:/chbin/sh client:hUlAPfM7t4Nbo:2017:20:client:/DHS3bin/client:/chbin/sh dhs3mt:iULmen4O5ZC9.:2018:20:dhs3mt:/DHS3bin/dhs3mt:/chbin/sh at4400:jU5vsXHRG1lQc:2019:1:at4400:/DHS3bin/at4400:/chbin/sh mntple:kUKXnTJ4.VGrI:2000:1:Sun-network-installation:/DHS3bin/mntple:/chbin/sh 部分解密口令如下 llatsni (install) tlah (halt) dhs3pms (dhs3pms) adfexc (adfexc) client (client) kermit (kermit) dhs3mt (dhs3mt) at4400 (at4400) mtch (mtch) mtcl (mtcl) letacla (root) 绝大多数帐号有一个.profile文件,其中会执行特定的命令,假如你不了解自己正在做什么,请不要贸然用这些帐号登录。~mtcl/.profile未做任何危险动作,因此攻击者可以使用该帐号telnet登录系统。
英文描述:
Alcatel OmniPCX 4400 installs known user accounts and passwords in the /etc/password file by default, which allows remote attackers to gain unauthorized access.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| alcatel-lucent | omnipcx | 4400 | - | - |
cpe:2.3:a:alcatel-lucent:omnipcx:4400:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:L/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2002-1691 |
2025-11-11 15:17:25 | 2025-11-11 07:32:17 |
| NVD | nvd_CVE-2002-1691 |
2025-11-11 14:50:28 | 2025-11-11 07:41:03 |
| CNNVD | cnnvd_CNNVD-200212-817 |
2025-11-11 15:08:40 | 2025-11-11 07:48:50 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 配置错误
- cnnvd_id: 未提取 -> CNNVD-200212-817
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 10.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']