{"vuid":"VU#135606","idnumber":"135606","name":"Dell KACE K2000 Appliance contains backdoor administrator account","keywords":["Dell KACE"],"overview":"The Dell KACE K2000 System Deployment Appliance contains a hidden administrator account that could allow a remote attacker to take control of an affected device.","clean_desc":"The Dell KACE K2000 Deployment Appliance is an integrated systems provisioning product for large-scale operating systems deployment. Some versions of the product contain a backdoor administrator account with a fixed password, accessible via the administrative web interface of the device. Furthermore, the backdoor account is not visible from, and cannot be removed via the appliance's administrative web interface.","impact":"A remote attacker could login to an affected device with administrative privileges. Secondary impacts include: the ability to make configuration changes, modification of existing deployment/recovery images, access to sensitive information, and the ability to mount further attacks (e.g., execute arbitrary commands with elevated privileges).","resolution":"Apply an update The Dell KACE K2000 Deployment Appliance version 3.7 removed this hidden administrator account. Affected users are encouraged to update as soon as possible to version 3.7 or later.","workarounds":"","sysaffected":"","thanks":"Thanks to \nTenable Network Security\n for reporting this vulnerability.","author":"This document was written by Chad Dougherty.","public":["h","t","t","p","s",":","/","/","s","u","p","p","o","r","t",".","s","o","f","t","w","a","r","e",".","d","e","l","l",".","c","o","m","/","k","2","0","0","0","-","s","y","s","t","e","m","s","-","d","e","p","l","o","y","m","e","n","t","-","a","p","p","l","i","a","n","c","e","/","k","b","/","1","1","5","5","6","0"],"cveids":["CVE-2011-4046"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-06-07T12:42:14Z","publicdate":"2011-11-03T00:00:00Z","datefirstpublished":"2011-11-08T20:02:19Z","dateupdated":"2015-09-30T20:07:36Z","revision":26,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"19","cam_attackeraccessrequired":"20","cam_scorecurrent":"33.84375","cam_scorecurrentwidelyknown":"40.6125","cam_scorecurrentwidelyknownexploited":"67.6875","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":33.84375,"vulnote":null}