First published: Thu Nov 16 2017(Updated: )
A vulnerability in Cisco Umbrella Insights Virtual Appliances 2.1.0 and earlier could allow an authenticated, local attacker to log in to an affected virtual appliance with root privileges. The vulnerability is due to the presence of default, static user credentials for an affected virtual appliance. An attacker could exploit this vulnerability by using the hypervisor console to connect locally to an affected system and then using the static credentials to log in to an affected virtual appliance. A successful exploit could allow the attacker to log in to the affected appliance with root privileges. Cisco Bug IDs: CSCvg31220.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Umbrella Insights Virtual Appliance | <=2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12350 is a vulnerability found in Cisco Umbrella Insights Virtual Appliances 2.1.0 and earlier that allows an authenticated, local attacker to log in to an affected virtual appliance with root privileges.
An attacker can exploit CVE-2017-12350 by using the default, static user credentials to gain root privileges on the affected virtual appliance.
CVE-2017-12350 has a severity rating of 8.2 out of 10.
To fix CVE-2017-12350, upgrade Cisco Umbrella Insights Virtual Appliances to version 2.1.1 or later.
More information about CVE-2017-12350 can be found at the following references: [1] http://www.securityfocus.com/bid/101879 [2] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-uva [3] https://www.info-sec.ca/advisories/Cisco-Umbrella-Hardcoded-Credentials.html