First published: Thu Feb 26 2009(Updated: )
Cisco Application Networking Manager (ANM) before 2.0 uses default usernames and passwords, which makes it easier for remote attackers to access the application, or cause a denial of service via configuration changes, related to "default user credentials during installation."
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Networking Manager | =1.1 | |
Cisco Application Networking Manager | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0616 has a moderate severity level due to the risks associated with default usernames and passwords.
To fix CVE-2009-0616, change the default usernames and passwords used in Cisco Application Networking Manager to unique, strong credentials.
CVE-2009-0616 affects Cisco Application Networking Manager versions prior to 2.0.
Exploiting CVE-2009-0616 can lead to unauthorized access and potential denial of service via configuration changes.
If exploited, CVE-2009-0616 could allow remote attackers to compromise the application and disrupt network services.