CA.ARCserve.axis2.Remote.Code.Execution
Description
This indicates an attempt to exploit a code-execution vulnerability in Computer Associates ARCserve D2D.
This is a security bypass error which may allow remote attackers to execute arbitrary code by using the default username and password: admin/axis2.
Affected Products
Computer Associates ARCserve D2D r15 Web Service Apache Axis2 World Accessible Servlet
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Modify the default password for the "admin" username in "\WebServiceImpl\WEB-INF\conf\axis2.xml".
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |