Short Name |
APP:ARKEIA:DEFAULT-PASSWORD |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Arkeia Network Backup Default Password |
Release Date |
2005/02/23 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to connect to the Arkeia Network Backup Agent file system with the default username and password. Several incidences of this signature can indicate that attackers are proactively attempting to exploit the numerous vulnerabilities in this software.
The Knox Arkeia Server is prone to a remotely exploitable stack-based buffer overrun. The issue occurs because the software fails to do sufficient bounds checking when handling data contained within a type 77 request packet. A remote attacker may leverage this issue to execute arbitrary code in the context of the vulnerable service.