Nexpose Vulnerability Database
- Try searching for a product or vendor.
- Only vulnerabilities that match all search terms will be returned.
- Enclose search terms in double quotes for an exact search.
- For CVE searches, only enter the CVE-YYYY-XXXX code.
Get Nexpose now
Search vulnerabilities with Rapid7's vulnerability management solutionFREE DOWNLOAD
Dell Remote Access Controller (DRAC) Default Login Credentials
|Severe (6)||10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)||Sep 25, 2007||Sep 25, 2007||Jan 28, 2011|
Dell products that utilize Dell Remote Access Controllers (DRAC) are shipped with the default username/password combination of root/calvin, respectively. It is recommended that the password is changed in order to prevent unauthorized access. Unauthorized users have access to view system information as well as perform maintenance tasks such as firmware upgrades, system powerup, powerdown, hardreset, powercycle and more. Access to the system console is also possible.
Get your solution now
Change the default login credentials for DRAC
SSH to the DRAC interface using the default username: root and password: calvin. At the RACADM command prompt (ie. $), issue the following command (change "newpassword" to the new password of your choice):
racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 2 newpassword
Refer to the Dell support page for more information.
Download our vulnerability management solution, Nexpose, for free today. Scan 100% of your infrastructure for vulnerabilities, understand your risk exposure, compare and prioritize your vulnerabilities and verify that they are remediated.