Rule Category

POLICY-OTHER --

Alert Message

POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected

Rule Explanation

The rule is looking for the use of the FreeSWITCH default username and password when attempting to execute command using mod_xml_rpc. These default username and password can be maliciously used to execute commands.

What To Look For

This is a policy rule which is triggered when a user attempts to use the default username and password for FreeSWITCH mod_xml_rpc command execution.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

Additional Links

Rule Vulnerability

Authentication Bypass

An Authentication Bypass occurs when there is a way to avoid providing user credentials to a system before performing restricted operations on said system.

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2018-19911
Loading description

MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Valid Accounts

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org