Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Security Activity Bulletin

Weak User and System Account Passwords

 
Threat Type:CWE-200: Information Leak / Disclosure
IntelliShield ID:53
Version:1
First Published:2000 May 01 16:00 GMT
Last Published:2000 May 01 16:00 GMT
Port: Not available
Urgency:Weakness Found
Credibility:Highly Credible
Severity:Harassment
 
Version Summary:

Some improperly secured systems do not protect against dictionary-assisted password guessing attacks.

 

Description
 

Many systems do not place limits on the number of incorrect login attempts, possibly allowing an attacker to guess passwords or in the case of SNMP, community strings.? Those systems that do not implement a delay between attempts are also subject to rapid brute force attacks from machines.? Although many FTP and telnet servers have implemented delays, some POP3 servers do not.? This could allow attackers to conduct password guessing attacks against an affected system.


Signatures
 
Cisco Intrusion Prevention System (IPS) 5.1
Signature IDSignature NameReleaseLatest Release Date
3653/0Multiple Rapid SSH ConnectionsS1112004 Aug 27 
4502/0SNMP Community Name Brute Force AttemptS32001 May 01 
6251/0Telnet Authorization FailureS22001 Feb 02 
6252/0Rlogin Authorization FailureS22001 Feb 02 
Cisco Intrusion Prevention System (IPS) 6.0
Signature IDSignature NameReleaseLatest Release Date
3127/0SMTP AUTH Brute Force AttemptS5892011 Aug 17 
3653/0Multiple Rapid SSH ConnectionsS1112004 Aug 27 
3720/0MSSQL sa Account Brute ForceS5182010 Oct 05 
3720/1MSSQL sa Account Brute ForceS5182010 Oct 05 
3721/0TNS Brute ForceS4512009 Nov 25 
4502/0SNMP Community Name Brute Force AttemptS32001 May 01 
4512/0SNMP Community String PublicS5792011 Jul 05 
5038/0WWW wwwsql file read BugS5602011 Apr 18 
5606/0SMB Authorization FailureS6332012 Mar 16 
6003/0SNMP Community String PrivateS5792011 Jul 05 
6250/0FTP Authorization FailureS4412009 Oct 13 
6250/1FTP Authorization FailureS4122009 Jul 09 
6251/0Telnet Authorization FailureS22001 Feb 02 
6252/0Rlogin Authorization FailureS22001 Feb 02 
6255/0SMB Authorization FailureS6122011 Dec 13 
6256/0HTTP Authorization FailureS5932011 Sep 07 
13491/0Worm Activity - Brute ForceS6732012 Oct 09 
13492/0Worm Activity - Brute ForceS6732012 Oct 09 
18920/0Administrative FTP User Failed To AuthenticateS6122011 Dec 13 
19919/0SQL Server BruteForce AttemptS4232009 Aug 06 
20020/0HTTP Authentication Brute Force AttemptS4362009 Sep 18 
Cisco Small Business IPS
Signature IDSignature NameReleaseLatest Release Date
SBIPS2009-000015/Telnet Authorization FailureSBIPS0000012010 Jan 15 
SBIPS2009-000258/Multiple Rapid SSH ConnectionsSBIPS0000042010 Jun 10 
SBIPS2009-000326/FTP Authorization FailureSBIPS0000012010 Jan 15 
SBIPS2009-000376/Rlogin Authorization FailureSBIPS0000012010 Jan 15 
SBIPS2010-000071/TNS Brute ForceSBIPS0000042010 Jun 10 
 
Alert History
 

This is a Security Activity Bulletin.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
IntelliShieldSecurity Activity Bulletin Original Release Base

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield