Rule Category

POLICY-OTHER --

Alert Message

POLICY-OTHER Reolink multiple devices default credentials login attempt

Rule Explanation

This rule looks for login requests to Reolink web servers that attempt to authenticate using the default admin credentials, "admin:123456".

What To Look For

This rule fires on attempts to login to Reolink devices using the default admin credentials.

Known Usage

Attacks/Scans seen in the wild

False Positives

Known false positives, with the described conditions

This rule will fire on any attempts to login to Reolink devices with the credentials "admin:123456".

Contributors

Cisco Talos Intelligence Group

Rule Groups

Rule Categories::Server::Web Applications

Rule Categories::Policy::Other

MITRE::ATT&CK Framework::Enterprise::Privilege Escalation::Valid Accounts::Default Accounts

CVE

Additional Links

Rule Vulnerability

N/A

Not Applicable

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2019-11001
Loading description