what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20160120-d9036

Cisco Security Advisory 20160120-d9036
Posted Jan 20, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in Cisco Modular Encoding Platform D9036 Software could allow an unauthenticated, remote attacker to log in to the system shell with the privileges of the root user. The vulnerability occurs because the root user has a default and static password. This account is created at installation and cannot be changed or deleted without impacting the functionality of the system. An attacker could exploit this vulnerability by remotely connecting to the affected system via SSH using this account. Successful exploitation could allow the attacker to access the system with the privileges of the root user. In addition to the root user, the guest user account also has a default and static password. The guest account is created at installation and cannot be changed or deleted without impacting the functionality of the system. However, this account has limited privileges on the system. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

tags | advisory, remote, shell, root
systems | cisco
SHA-256 | fc9d0d2252846864b39f5c3b09475bac31aed871f4a9dc779685ed832a514880

Cisco Security Advisory 20160120-d9036

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Modular Encoding Platform D9036 Software Default Credentials Vulnerability

Advisory ID: cisco-sa-20160120-d9036

Revision 1.0

For Public Release 2016 January 20 16:00 UTC (GMT)
+-------------------------------------------------------------------------------

Summary
=======
A vulnerability in Cisco Modular Encoding Platform D9036 Software could allow an unauthenticated, remote attacker to log in to the system shell with the privileges of the root user.

The vulnerability occurs because the root user has a default and static password. This account is created at installation and cannot be changed or deleted without impacting the functionality of the system. An attacker could exploit this vulnerability by remotely connecting to the affected system via SSH using this account. Successful exploitation could allow the attacker to access the system with the privileges of the root user.

In addition to the root user, the guest user account also has a default and static password. The guest account is created at installation and cannot be changed or deleted without impacting the functionality of the system. However, this account has limited privileges on the system.

Cisco has released software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-d9036

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=tkHe
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close