// For flags

CVE-2019-1723

Cisco Common Services Platform Collector Static Credential Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.

Una vulnerabilidad en Cisco Common Services Platform Collector (CSPC) podría permitir que un atacante remoto no autenticado acceda a un dispositivo afectado mediante el uso de una cuenta que tiene una contraseña estática por defecto. Esta cuenta no tiene privilegios de administrador. La vulnerabilidad existe debido a que el software afectado tiene una cuenta de usuario con una contraseña estática por defecto. Un atacante podría explotar esta vulnerabilidad conectándose remotamente al sistema afectado mediante esta cuenta. Un exploit con éxito podría permitir que el atacante consiga iniciar sesión en el CSPC utilizando la cuenta por defecto. Para Cisco CSPC 2.7.x, Cisco solucionó esta vulnerabilidad en la CVErsión 2.7.4.6. Para Cisco CSPC 2.8.x, Cisco solucionó esta vulnerabilidad en la CVErsión 2.8.1.2.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-03-13 CVE Published
  • 2024-09-12 EPSS Updated
  • 2024-11-19 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-798: Use of Hard-coded Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Common Services Platform Collector
Search vendor "Cisco" for product "Common Services Platform Collector"
>= 2.7.2 < 2.7.4.6
Search vendor "Cisco" for product "Common Services Platform Collector" and version " >= 2.7.2 < 2.7.4.6"
-
Affected
Cisco
Search vendor "Cisco"
Common Services Platform Collector
Search vendor "Cisco" for product "Common Services Platform Collector"
>= 2.8.0 < 2.8.1.2
Search vendor "Cisco" for product "Common Services Platform Collector" and version " >= 2.8.0 < 2.8.1.2"
-
Affected