Lucene search

K
certCERTVU:127545
HistoryApr 26, 2007 - 12:00 a.m.

Cisco NetFlow Collection Engine contains known default passwords

2007-04-2600:00:00
www.kb.cert.org
24

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.02

Percentile

88.9%

Overview

A vulnerability in the Cisco NetFlow Collection Engine could allow a remote attacker to gain access to a vulnerable system.

Description

The Cisco Network Services (CNS) NetFlow Collection Engine (NFC) is a software package for supported UNIX platforms and is used to collect and monitor NetFlow accounting data for network devices such as routers and switches. It includes a web-based interface to perform application maintenance, configuration, and troubleshooting.

Versions of NFC prior to 6.0 create and use default accounts with an identical username and password of “nfcuser”.


Impact

A remote attacker with knowledge of the default account information can gain administrative control of the NFC application configuration through the web-based interface.
For some configurations, the attacker may also be able to gain user access to the host operating system with the privileges of nfcuser. This access may allow for additional privilege escalation attacks on an affected system.


Solution

Change passwords for the affected account
Cisco has published instructions for changing the passwords on the nfcuser account in Cisco Security Advisory cisco-sa-20070425-nfc. This advisory contains additional information about how the issue has been addressed in newer versions of the affected software. Note that both the web-based and UNIX user account passwords must be changed on some platforms.


Vendor Information

127545

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Cisco Systems, Inc. __ Affected

Updated: April 26, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Cisco Systems has published Cisco Security Advisory cisco-sa-20070425-nfc in response to this issue. Users are encouraged to review this advisory and follow its directions for changing the affected account password.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23127545 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.cisco.com/warp/public/707/cisco-sa-20070425-nfc.shtml&gt;

Acknowledgements

Thanks to Cisco Systems Product Security Incident Response Team for reporting this vulnerability.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2007-2282
Severity Metric: 7.50 Date Public:

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.02

Percentile

88.9%

Related for VU:127545