| VID |
29093 |
| Severity |
20 |
| Port |
2533 |
| Protocol |
TCP |
| Class |
Daemon |
| Detailed Description |
The target host seems to be an Alcatel PBX 4400. Alcatel 4400 can be managed through serial port, or through LAN. In case of LAN, 4400 is listening on TCP port 2533. An audit of an Alcatel PBX 4400 has revealed very interesting security vulnerabilities, default passwords, easy gaining of root accesses, DoS, etc. This device should not be accessed from un-trusted networks.
* References: http://www.securiteam.com/exploits/5KP0Q0K6AO.html
* Platforms Affected: Alcatel 4400 PBX running real-time Chorus OS |
| Recommendation |
Put your Alcatel 4400 behind a firewall, and allow only connection between your PBXes (if you have more than one, linked) and from your management station. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|