First published: Sat Jul 04 2015(Updated: )
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Domain Manager Platform | =4.4.1 | |
Cisco Unified Communications Domain Manager Platform | =4.4.2 | |
Cisco Unified Communications Domain Manager Platform | =4.4.3 | |
Cisco Unified Communications Domain Manager Platform | =4.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4196 is considered to have a high severity due to the presence of a hardcoded password that allows remote attackers to gain root access.
To fix CVE-2015-4196, upgrade Cisco Unified Communications Domain Manager to version 4.4.5 or later where the hardcoded password issue is resolved.
CVE-2015-4196 affects users operating Cisco Unified Communications Domain Manager versions 4.4.1 through 4.4.4.
An attacker exploiting CVE-2015-4196 can obtain root access to the affected Cisco Unified Communications Domain Manager through SSH.
CVE-2015-4196 was disclosed on July 1, 2015, in a Cisco security advisory.