You are here
Home > Preporuke > Ranjivost Cisco Video Surveillance Manager softvera

Ranjivost Cisco Video Surveillance Manager softvera

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Video Surveillance Manager Appliance Default Password Vulnerability

Advisory ID: cisco-sa-20180921-vsm

Revision: 1.0

For Public Release: 2018 September 21 16:00 GMT

Last Updated: 2018 September 21 16:00 GMT

CVE ID(s): CVE-2018-15427

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS) platforms could allow an unauthenticated, remote attacker to log in to an affected system by using the root account, which has default, static user credentials.

The vulnerability is due to the presence of undocumented, default, static user credentials for the root account of the affected software on certain systems. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180921-vsm [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180921-vsm”]

—–BEGIN PGP SIGNATURE—–
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=g55x
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa chromium

Otkriveni su sigurnosni nedostaci u programskom paketu chromium za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close