First published: Thu Feb 22 2018(Updated: )
A vulnerability in the use of JSON web tokens by the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to gain administrative access to an affected system. The vulnerability is due to the presence of static default credentials for the web-based service portal of the affected software. An attacker could exploit this vulnerability by extracting the credentials from an image of the affected software and using those credentials to generate a valid administrative session token for the web-based service portal of any other installation of the affected software. A successful exploit could allow the attacker to gain administrative access to the web-based service portal of an affected system. This vulnerability affects Cisco Elastic Services Controller Software Release 3.0.0. Cisco Bug IDs: CSCvg30884.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Virtual Managed Services | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0130 has been classified as a critical vulnerability due to its potential for unauthorized administrative access.
CVE-2018-0130 allows unauthorized access through static default credentials that can be exploited by remote attackers.
CVE-2018-0130 specifically affects Cisco Virtual Managed Services version 3.0.
To mitigate risks from CVE-2018-0130, it's essential to change the default credentials to strong, unique passwords.
Yes, Cisco has released updates that address CVE-2018-0130, and users should apply the latest patches to their systems.