Default Account in Cisco CSPC Allows Unauthorized Access

0
118


Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.

Cisco CSPC is an SNMP-based tool that collects information from Cisco devices installed on a network. The tool is used by both Smart Net Total Care (SmartNet) Network Collector and Partner Support Service (PSS) Network Collector.

The flaw, tracked as CVE-2019-1723, is related to the existence of a default account with a static password. While the account does not have admin privileges, it can still be useful to malicious actors as it allows an unauthenticated attacker to gain remote access to the system.

The vulnerability, discovered by researcher David Coomber, impacts CSPC releases 2.7.2 through 2.7.4.5 and all 2.8.x releases. Patches are included in versions 2.7.4.6 and 2.8.1.2.

Cisco says it’s not aware of any attacks exploiting this flaw.

The networking giant this week also informed customers of a high-severity denial-of-service (DoS) vulnerability in Small Business SPA514G IP Phones.

The security hole impacts the Session Initiation Protocol (SIP) processing implementation of these devices and it can be exploited remotely without authentication to cause a device to become unresponsive until it’s manually restarted.

Cisco says it does not plan on releasing a patch for this flaw as the impacted IP phone has reached end of life. The issue was discovered during internal testing and there is no evidence of malicious exploitation.

Earlier this month, Cisco released patches for over two dozen serious vulnerabilities impacting its Nexus switches, including flaws that can be exploited for DoS attacks, arbitrary code execution, and privilege escalation.

The company has also published an informational advisory urging Nexus device owners to secure networks where the PowerOn Auto Provisioning (POAP) feature is used or disable the feature if it’s not needed.

Related:Hackers Target Cisco Routers via Recently Patched Flaws

Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:
Tags:





Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here