First published: Thu Feb 07 2019(Updated: )
A vulnerability in the default configuration of the Cisco Aironet Active Sensor could allow an unauthenticated, remote attacker to restart the sensor. The vulnerability is due to a default local account with a static password. The account has privileges only to reboot the device. An attacker could exploit this vulnerability by guessing the account name and password to access the CLI. A successful exploit could allow the attacker to reboot the device repeatedly, creating a denial of service (DoS) condition. It is not possible to change the configuration or view sensitive data with this account. Versions prior to DNAC1.2.8 are affected.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet Active Sensor | ||
Cisco Digital Network Architecture Center | <1.2.8 | |
<1.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1675 is a vulnerability in the default configuration of the Cisco Aironet Active Sensor.
CVE-2019-1675 has a severity rating of 7.5 out of 10.
CVE-2019-1675 allows an unauthenticated, remote attacker to restart the sensor due to a default local account with a static password.
To fix CVE-2019-1675, Cisco recommends upgrading to a fixed software release.
You can find more information about CVE-2019-1675 at the following references: securityfocus.com/bid/106944 and tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-aas-creds.