Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.106852
Categoría:CISCO
Título:Cisco Prime Data Center Network Manager Server Static Credential Vulnerability
Resumen:A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software;could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using;an account that has a default, static password. The account could be granted root- or system-level privileges.
Descripción:Summary:
A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software
could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using
an account that has a default, static password. The account could be granted root- or system-level privileges.

Vulnerability Insight:
The vulnerability exists because the affected software has a default user
account that has a default, static password. The user account is created automatically when the software is
installed. An attacker could exploit this vulnerability by connecting remotely to an affected system and logging
in to the affected software by using the credentials for this default user account.

Vulnerability Impact:
A successful exploit could allow the attacker to use this default user
account to log in to the affected software and gain access to the administrative console of a DCNM server.

Solution:
Update to Cisco Prime DCNM Software releases 10.2(1) or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-6640
BugTraq ID: 98937
http://www.securityfocus.com/bid/98937
http://www.securitytracker.com/id/1038625
CopyrightCopyright (C) 2017 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.