SolarWind LEM Default SSH Password Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 5 Apr 2017.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits the default credentials of SolarWind LEM. A menu system is encountered when the SSH service is accessed with the default username and password which is "cmc" and "password". By exploiting a vulnerability that exist on the menuing script, an attacker can escape from restricted shell. This Metasploit module was tested against SolarWinds LEM v6.3.1.

    Continue reading...
     

Share This Page

Loading...