Lucene search

K
ciscoCiscoCISCO-SA-20180307-CPCP
HistoryMar 07, 2018 - 4:00 p.m.

Cisco Prime Collaboration Provisioning Hard-Coded Password Vulnerability

2018-03-0716:00:00
tools.cisco.com
33

EPSS

0.001

Percentile

33.8%

A vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software could allow an unauthenticated, local attacker to log in to the underlying Linux operating system.

The vulnerability is due to a hard-coded account password on the system. An attacker could exploit this vulnerability by connecting to the affected system via Secure Shell (SSH) using the hard-coded credentials. A successful exploit could allow the attacker to access the underlying operating system as a low-privileged user. After low-level privileges are gained, the attacker could elevate to root privileges and take full control of the device.

Note: Although this vulnerability has a Common Vulnerability Scoring System (CVSS) Base score of 5.9, which is normally assigned a Security Impact Rating (SIR) of Medium, there are extenuating circumstances that allow an attacker to elevate privileges to root. For these reasons, the SIR has been set to Critical.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-cpcp [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-cpcp”]

Affected configurations

Vulners
Node
ciscoprime_collaboration_provisioningMatchany
OR
ciscoprime_collaboration_provisioningMatchany
VendorProductVersionCPE
ciscoprime_collaboration_provisioninganycpe:2.3:a:cisco:prime_collaboration_provisioning:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

33.8%

Related for CISCO-SA-20180307-CPCP