| VID |
23082 |
| Severity |
40 |
| Port |
25702 |
| Protocol |
TCP |
| Class |
Daemon |
| Detailed Description |
eSeSIX Thintune Thin Client contains a backdoor account that allows remote attackers to gain complete access to the target device. Thintune is a series of thin client appliances sold by eSeSIX GmbH, Germany. They offer ICA, RDP, X11 and SSH support based on a customized Linux platform. There is the password ("jstwo") on the Thintune, which is hardcoded into the '/usr/bin/radmin' shell script and cannot be changed via the configuration interface. By connecting an undocumented process listening on TCP port 25072 and authenticating by a short password("jstwo"), a remote attacker could gain full control over the thin client.
* References: http://www.securityfocus.com/archive/1/369833
* Platforms Affected: eSeSIX Thintune eXtreme 2.4.38 Firmware eSeSIX Thintune L 2.4.38 Firmware eSeSIX Thintune M 2.4.38 Firmware eSeSIX Thintune Mobile 2.4.38 Firmware eSeSIX Thintune S 2.4.38 Firmware eSeSIX Thintune XM 2.4.38 Firmware eSeSIX Thintune XS 2.4.38 Firmware Linux Any version |
| Recommendation |
Upgrade to the firmware v2.4.39 released including fixes for this vulnerability. Please contact the vendor for more information: http://www.thintune.com/ |
| Related URL |
CVE-2004-2048 (CVE) |
| Related URL |
10794 (SecurityFocus) |
| Related URL |
16790 (ISS) |
|