First published: Thu Jun 02 2011(Updated: )
Cisco Media Processing Software before 1.2 on Media Experience Engine (MXE) 5600 devices has a default root password, which makes it easier for context-dependent attackers to obtain access via (1) the local console, (2) an SSH session, or (3) a TELNET session, aka Bug ID CSCto77737.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Media Processing Software | <=1.1.3 | |
Cisco Media Processing Software | =1.0.0 | |
Cisco Media Processing Software | =1.0.1 | |
Cisco Media Processing Software | =1.1.0 | |
Cisco Media Processing Software | =1.1.1 | |
Cisco Media Experience Engine |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1623 is classified as a high severity vulnerability due to the presence of a default root password.
To fix CVE-2011-1623, change the default root password on affected Cisco Media Processing Software installations.
CVE-2011-1623 affects users of Cisco Media Processing Software versions prior to 1.2 on Media Experience Engine 5600 devices.
CVE-2011-1623 can be exploited through local console access, SSH sessions, or TELNET sessions by context-dependent attackers.
CVE-2011-1623 is commonly referred to as the default root password vulnerability in Cisco Media Processing Software.