CWE
798
Advisory Published

cisco-sa-20180718-policy-cm-default-psswrd: Cisco Policy Suite Cluster Manager Default Password Vulnerability

First published: Wed Jul 18 2018(Updated: )

A vulnerability in the Cluster Manager of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system using the root account, which has default, static user credentials. The vulnerability is due to the presence of undocumented, static user credentials for the root account. An attacker could exploit this vulnerability by using the account to log in to an affected system. An exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd

Affected SoftwareAffected VersionHow to fix
Cisco Policy Suite Software

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-20180718-policy-cm-default-psswrd?

    The severity of cisco-sa-20180718-policy-cm-default-psswrd is considered critical due to the potential for unauthorized access.

  • How do I fix cisco-sa-20180718-policy-cm-default-psswrd?

    To fix cisco-sa-20180718-policy-cm-default-psswrd, change the default static credentials for the root account and apply recommended security patches.

  • Who is affected by cisco-sa-20180718-policy-cm-default-psswrd?

    Organizations using Cisco Policy Suite are affected by cisco-sa-20180718-policy-cm-default-psswrd.

  • What can an attacker do with cisco-sa-20180718-policy-cm-default-psswrd?

    An attacker exploiting cisco-sa-20180718-policy-cm-default-psswrd can log in to the system with root access, leading to potential data breaches or system manipulation.

  • Is there a workaround for cisco-sa-20180718-policy-cm-default-psswrd?

    Currently, changing the default credentials is the only effective workaround for mitigating the risks associated with cisco-sa-20180718-policy-cm-default-psswrd.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203