First published: Wed Jul 18 2018(Updated: )
A vulnerability in the Cluster Manager of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system using the root account, which has default, static user credentials. The vulnerability is due to the presence of undocumented, static user credentials for the root account. An attacker could exploit this vulnerability by using the account to log in to an affected system. An exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Policy Suite Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180718-policy-cm-default-psswrd is considered critical due to the potential for unauthorized access.
To fix cisco-sa-20180718-policy-cm-default-psswrd, change the default static credentials for the root account and apply recommended security patches.
Organizations using Cisco Policy Suite are affected by cisco-sa-20180718-policy-cm-default-psswrd.
An attacker exploiting cisco-sa-20180718-policy-cm-default-psswrd can log in to the system with root access, leading to potential data breaches or system manipulation.
Currently, changing the default credentials is the only effective workaround for mitigating the risks associated with cisco-sa-20180718-policy-cm-default-psswrd.