{"vuid":"VU#426459","idnumber":"426459","name":"Beck GmbH IPC@Chip FtpD allows an attacker to gain access to the device","keywords":["Beck GmbH","IPC@Chip","FtpD","default passwords","full access"],"overview":"There is a vulnerability in the Beck IPC@CHIP that allows an attacker to gain access to the device.","clean_desc":"The Beck IPC@CHIP is a single chip embedded webserver. This device also contains an ftp server that is configured by default to allow anonymous access. Additionally, the device grants full administrative access to any user who logs in as an anonymous user. Because there is no password set by default for anonymous login, a malicious user can connect to the service and do anything the legitimate system administrator could do logged in via ftp.","impact":"Unless the administrator changes the default settings on the Beck IPC@CHIP, an attacker can connect to the ftp service, log in as an anonymous user, gain superuser privileges, and do anything the administrator could do if they were logged in via ftp.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"Change the default settings on the ftp server to now allow anonymous access.","sysaffected":"","thanks":"This vulnerability was discovered by \nSentry Research Labs","author":"This document was written by Ian A. Finlay.","public":["http://sentry-labs.com/files/ipc0101052101eng.txt"," http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html","http://www.securityfocus.com/bid/2770"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-06-05T16:26:08Z","publicdate":"2001-05-24T00:00:00Z","datefirstpublished":"2001-09-26T14:49:28Z","dateupdated":"2001-09-26T17:52:03Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"18.75","cam_scorecurrentwidelyknown":"18.75","cam_scorecurrentwidelyknownexploited":"33.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.75,"vulnote":null}