Rapid7 Vulnerability & Exploit Database

TDS (SQL Server) access with sa and no password

Back to Search

TDS (SQL Server) access with sa and no password

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
08/12/2002
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

TDS servers such as Microsoft SQL Server and Sybase create a default administrative account with the user ID "sa" and password "". It is best practice to remove default accounts, if possible. For accounts required by the system, the default password should be changed. This account often grants full access to the system.

Solution(s)

  • tds-generic-0001

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;