CVE-2018-0150
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in Cisco IOS XE Software could allow an unauthenticated, remote attacker to log in to a device running an affected release of Cisco IOS XE Software with the default username and password that are used at initial boot, aka a Static Credential Vulnerability. The vulnerability is due to an undocumented user account with privilege level 15 that has a default username and password. An attacker could exploit this vulnerability by using this account to remotely connect to an affected device. A successful exploit could allow the attacker to log in to the device with privilege level 15 access. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS XE Software Release 16.x. This vulnerability does not affect Cisco IOS XE Software releases prior to Release 16.x. Cisco Bug IDs: CSCve89880.
Una vulnerabilidad en Cisco IOS XE Software podría permitir que un atacante remoto no autenticado inicie sesión en un dispositivo que ejecute una versión de Cisco IOS XE Software con el nombre de usuario y contraseña por defecto que se emplean en el arranque inicial. Esta vulnerabilidad también se conoce como Static Credential Vulnerability. La vulnerabilidad se debe a una cuenta de usuario no documentada con un nivel 15 de privilegios que tiene un nombre de usuario y contraseña por defecto. Un atacante podría explotar esta vulnerabilidad utilizando esta cuenta para conectarse de forma remota al dispositivo afectado. Un exploit con éxito podría permitir que el atacante consiga iniciar sesión en el dispositivo con un nivel 15 de privilegios de acceso. Esta vulnerabilidad afecta a los dispositivos de Cisco que ejecuten una distribución vulnerable del software de Cisco IOS XE Release 16.x. La vulnerabilidad no afecta a distribuciones de Cisco IOS XE Software anteriores a Release 16.x. Cisco Bug IDs: CSCve89880.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-27 CVE Reserved
- 2018-03-28 CVE Published
- 2023-09-28 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/103539 | Third Party Advisory | |
http://www.securitytracker.com/id/1040579 | Mitigation |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc | 2023-05-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.5.1 Search vendor "Cisco" for product "Ios Xe" and version "16.5.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | 4431 Integrated Services Router Search vendor "Cisco" for product "4431 Integrated Services Router" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.5.1 Search vendor "Cisco" for product "Ios Xe" and version "16.5.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | 4451 Integrated Services Router Search vendor "Cisco" for product "4451 Integrated Services Router" | - | - |
Safe
|