First published: Mon Jan 04 2016(Updated: )
It was found that default configuration for nagios on Fedora is administrative account with user "nagiosadmin" with fixed password "nagiosadmin" and no IP based access restriction. This information is missing in packaged README file. Original report: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1295155">https://bugzilla.redhat.com/show_bug.cgi?id=1295155</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0726 is considered a high severity vulnerability due to the use of default credentials and lack of access restrictions.
To fix CVE-2016-0726, change the default password for the nagiosadmin account and implement IP-based access controls.
CVE-2016-0726 affects Nagios software, specifically versions that use the default configuration.
Yes, CVE-2016-0726 can be exploited remotely due to the lack of access restrictions for the nagiosadmin account.
There is no specific patch for CVE-2016-0726; mitigation involves changing default settings and enhancing security measures.