// For flags

CVE-2019-1675

Cisco Aironet Active Sensor Static Credentials Vulnerability

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in the default configuration of the Cisco Aironet Active Sensor could allow an unauthenticated, remote attacker to restart the sensor. The vulnerability is due to a default local account with a static password. The account has privileges only to reboot the device. An attacker could exploit this vulnerability by guessing the account name and password to access the CLI. A successful exploit could allow the attacker to reboot the device repeatedly, creating a denial of service (DoS) condition. It is not possible to change the configuration or view sensitive data with this account. Versions prior to DNAC1.2.8 are affected.

Una vulnerabilidad en la configuración por defecto de Cisco Aironet Active Sensor podría permitir que un atacante remoto sin autenticar reinicie el sensor. La vulnerabilidad se debe a una cuenta local por defecto con una contraseña estática. La cuenta solo tiene privilegios para reiniciar el dispositivo. Un atacante podría explotar esta vulnerabilidad adivinando el nombre de la cuenta y la contraseña para acceder a la interfaz de línea de comandos. Si se explota con éxito, podría permitir que el atacante reinicie el dispositivo repetidamente, provocando una denegación de servicio (DoS). No es posible cambiar la configuración o ver datos sensibles con esta cuenta. Las versiones anteriores a DNAC1.2.8 se han visto afectadas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-02-07 CVE Published
  • 2024-06-29 EPSS Updated
  • 2024-11-19 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-798: Use of Hard-coded Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Aironet Active Sensor
Search vendor "Cisco" for product "Aironet Active Sensor"
--
Affected
Cisco
Search vendor "Cisco"
Digital Network Architecture Center
Search vendor "Cisco" for product "Digital Network Architecture Center"
< 1.2.8
Search vendor "Cisco" for product "Digital Network Architecture Center" and version " < 1.2.8"
-
Affected