Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-4933
Deferred
More InfoOfficial Page
Source-cret@cert.org
View Known Exploited Vulnerability (KEV) details
Published At-20 Oct, 2012 | 18:55
Updated At-11 Apr, 2025 | 00:51

The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:C/I:N/A:N
CPE Matches

Novell
novell
>>zenworks_asset_management>>7.5
cpe:2.3:a:novell:zenworks_asset_management:7.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-255Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.kb.cert.org/vuls/id/332412cret@cert.org
US Government Resource
http://www.securitytracker.com/id?1027682cret@cert.org
N/A
https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworkscret@cert.org
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/79252cret@cert.org
N/A
http://www.kb.cert.org/vuls/id/332412af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.securitytracker.com/id?1027682af854a3a-2127-422b-91ae-364da2661108
N/A
https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworksaf854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/79252af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found