CVE-2019-1723
Cisco Common Services Platform Collector Static Credential Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.
Una vulnerabilidad en Cisco Common Services Platform Collector (CSPC) podría permitir que un atacante remoto no autenticado acceda a un dispositivo afectado mediante el uso de una cuenta que tiene una contraseña estática por defecto. Esta cuenta no tiene privilegios de administrador. La vulnerabilidad existe debido a que el software afectado tiene una cuenta de usuario con una contraseña estática por defecto. Un atacante podría explotar esta vulnerabilidad conectándose remotamente al sistema afectado mediante esta cuenta. Un exploit con éxito podría permitir que el atacante consiga iniciar sesión en el CSPC utilizando la cuenta por defecto. Para Cisco CSPC 2.7.x, Cisco solucionó esta vulnerabilidad en la CVErsión 2.7.4.6. Para Cisco CSPC 2.8.x, Cisco solucionó esta vulnerabilidad en la CVErsión 2.8.1.2.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-06 CVE Reserved
- 2019-03-13 CVE Published
- 2024-09-12 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107405 | Third Party Advisory | |
https://www.info-sec.ca/advisories/Cisco-Collector.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-cspcscv | 2020-10-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Common Services Platform Collector Search vendor "Cisco" for product "Common Services Platform Collector" | >= 2.7.2 < 2.7.4.6 Search vendor "Cisco" for product "Common Services Platform Collector" and version " >= 2.7.2 < 2.7.4.6" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Common Services Platform Collector Search vendor "Cisco" for product "Common Services Platform Collector" | >= 2.8.0 < 2.8.1.2 Search vendor "Cisco" for product "Common Services Platform Collector" and version " >= 2.8.0 < 2.8.1.2" | - |
Affected
|