Default Credentials of WMT Server

By
Sooraj V Nair
Published on
16 Jun 2021
Vulnerability

This vulnerability exists in WMT Playout Server’s Web Administrative Interface on Version 20.2.8 and Below, due to the presence of a default account that has a default password “pokon”. An attacker exploits this vulnerability by connecting an affected system using this default account. A successful exploit will help the attacker to gain read and write access to system data, including the configuration of affected devices.

Impact

An attacker will be able to obtain access to sensitive portions of the system and have administrative privileges to control the device.

Mitigation / Precaution

We recommend you to upgrade WMT Playout server to latest version.


Written by
Sooraj V Nair
Sooraj V Nair
Cyber Security Engineer
Experience the Beagle Security platform
Unlock one full penetration test and all Advanced plan features free for 10 days