You are here
Home > Preporuke > Ranjivost Cisco Prime DCNM aplikacije

Ranjivost Cisco Prime DCNM aplikacije

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Prime Data Center Network Manager Server Static Credential Vulnerability

Advisory ID: cisco-sa-20170607-dcnm2

Revision: 1.0

For Public Release: 2017 June 7 16:00 GMT

Last Updated: 2017 June 7 16:00 GMT

CVE ID(s): CVE-2017-6640

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary
=======
A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using an account that has a default, static password. The account could be granted root- or system-level privileges.

The vulnerability exists because the affected software has a default user account that has a default, static password. The user account is created automatically when the software is installed. An attacker could exploit this vulnerability by connecting remotely to an affected system and logging in to the affected software by using the credentials for this default user account. A successful exploit could allow the attacker to use this default user account to log in to the affected software and gain access to the administrative console of a DCNM server.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2”]

—–BEGIN PGP SIGNATURE—–
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=SYsN
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-06-0046-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco AnyConnect proizvoda

Otkrivena je ranjivost u Cisco AnyConnect proizvodu uzrokovana nepravilnom provjerom putanje i imena DLL datoteke prije učitavanja. Ranjivost bi potencijalnom...

Close