Family: Databases --> Category: attack
Microsoft's SQL Blank Password Vulnerability Scan
Vulnerability Scan Summary
Microsoft's SQL Blank Password
Detailed Explanation for this Vulnerability Test
The remote MS SQL server has the default 'sa' account
enabled without any password.
A possible hacker may use this flaw to execute commands against
the remote host, as well as read your database content.
Solution : disable this account, or set a password to it. In addition
to this, it is suggested you filter incoming tcp traffic to this port.
For MSDE (OEM versions without MSQL console) :
C:\MSSQL7\BINN\osql -U sa
At the Password: prompt press .
Type the following replacing .password. with the password you wish to
assign, in single quotes:
EXEC sp_password NULL, .password., .sa.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.