First published: Tue Mar 01 2005(Updated: )
Cisco devices running Application and Content Networking System (ACNS) 4.x, 5.0, 5.1, or 5.2 use a default password when the setup dialog has not been run, which allows remote attackers to gain access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application and Content Networking Software | =5.0.1 | |
Cisco Application and Content Networking Software | =5.0.3 | |
Cisco Application and Content Networking Software | =4.2.11 | |
Cisco Application and Content Networking Software | =5.0.5 | |
Cisco Application and Content Networking Software | =4.1.1 | |
Cisco Application and Content Networking Software | =4.0.3 | |
Cisco Application and Content Networking Software | =5.2 | |
Cisco Application and Content Networking Software | =5.0 | |
Cisco Application and Content Networking Software | =4.1.3 | |
Cisco Application and Content Networking Software | =4.2 | |
Cisco Application and Content Networking Software | =4.2.9 | |
Cisco Application and Content Networking Software | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0601 is classified as a high severity vulnerability due to the risk of remote unauthorized access.
To fix CVE-2005-0601, ensure that the setup dialog is properly run and change the default password used by the Cisco device.
Cisco Application and Content Networking Software versions 4.x, 5.0 to 5.2 are affected by CVE-2005-0601.
A practical workaround for CVE-2005-0601 includes disabling remote access until the device configuration is secured.
Exploiting CVE-2005-0601 can lead to complete control of the affected Cisco devices, resulting in data breaches or service disruptions.