First published: Tue Jun 13 2017(Updated: )
A vulnerability in the ConfD CLI of Cisco Elastic Services Controllers could allow an authenticated, remote attacker to log in to an affected system as the admin user, aka an Insecure Default Administrator Credentials Vulnerability. More Information: CSCvc76661. Known Affected Releases: 2.2(9.76).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Elastic Services Controller | =2.2\(9.76\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6689 has a medium severity rating due to its potential for unauthorized access using default administrator credentials.
To fix CVE-2017-6689, change the default administrator credentials in the Cisco Elastic Services Controller to strong, unique passwords.
CVE-2017-6689 primarily affects users running Cisco Elastic Services Controller version 2.2(9.76).
Yes, CVE-2017-6689 can be exploited remotely by an authenticated attacker with access to default admin credentials.
The implications of CVE-2017-6689 include potential unauthorized administrative access, which may lead to system compromise or data breaches.