Vulnerability Note VU#712723
Oracle 9iAS default configuration uses well-known default passwords
Oracle Database Server version 9iAS installs with up to 160 distinct default login accounts. The usernames and passwords for these have been made publicly available and could be used by an attacker to gain access to an Oracle server.
Depending on the components chosen at installation time, Oracle Database Server version 9iAS (and possibly other versions) includes in its default configuration as many as 160 accounts with known usernames and passwords. Many of the passwords are the same as the corresponding username, making it even easier for attackers to gain access.
Additionally, some Oracle components include functionality that relies on the existence of the default logins with their default passwords.
Attackers may gain access to the Oracle server through a known default login account.
The CERT/CC is currently unaware of a practical solution to this problem.
Change passwords on Oracle's default login accounts. See the complete list of default logins in Appendix A of David Litchfield's white paper, "Hackproofing Oracle Application Server," located at:
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Oracle||Affected||07 Feb 2002||26 Feb 2002|
CVSS Metrics (Learn More)
Thanks to David Litchfield for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
- CVE IDs: Unknown
- Date Public: 10 Jan 2002
- Date First Published: 26 Feb 2002
- Date Last Updated: 26 Feb 2002
- Severity Metric: 11.25
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.