Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.
Cisco CSPC is an SNMP-based tool that collects information from Cisco devices installed on a network. The tool is used by both Smart Net Total Care (SmartNet) Network Collector and Partner Support Service (PSS) Network Collector.
The flaw, tracked as CVE-2019-1723, is related to the existence of a default account with a static password. While the account does not have admin privileges, it can still be useful to malicious actors as it allows an unauthenticated attacker to gain remote access to the system.
The vulnerability, discovered by researcher David Coomber, impacts CSPC releases 2.7.2 through 220.127.116.11 and all 2.8.x releases. Patches are included in versions 18.104.22.168 and 22.214.171.124.
Cisco says it’s not aware of any attacks exploiting this flaw.
The networking giant this week also informed customers of a high-severity denial-of-service (DoS) vulnerability in Small Business SPA514G IP Phones.
The security hole impacts the Session Initiation Protocol (SIP) processing implementation of these devices and it can be exploited remotely without authentication to cause a device to become unresponsive until it’s manually restarted.
Cisco says it does not plan on releasing a patch for this flaw as the impacted IP phone has reached end of life. The issue was discovered during internal testing and there is no evidence of malicious exploitation.
Earlier this month, Cisco released patches for over two dozen serious vulnerabilities impacting its Nexus switches, including flaws that can be exploited for DoS attacks, arbitrary code execution, and privilege escalation.
The company has also published an informational advisory urging Nexus device owners to secure networks where the PowerOn Auto Provisioning (POAP) feature is used or disable the feature if it’s not needed.