Lucene search

K
ciscoCiscoCISCO-SA-20151104-MSE-CRED
HistoryNov 04, 2015 - 4:00 p.m.

Cisco Mobility Services Engine Static Credential Vulnerability

2015-11-0416:00:00
tools.cisco.com
11

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.003

Percentile

68.6%

A vulnerability in the Cisco Mobility Services Engine (MSE) could allow an unauthenticated, remote attacker to log in to the MSE with the default oracle account. This account does not have full administrator privileges.

The vulnerability is due to a user account that has a default and static password. This account is created at installation and cannot be changed or deleted without impacting the functionality of the system. An attacker could exploit this vulnerability by remotely connecting to the affected system via SSH using this account. A successful exploit could allow the attacker to log in to the MSE using the default oracle account.

Cisco has released software updates that address this vulnerability. A workaround that mitigates this vulnerability is available.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-mse-cred[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-mse-cred”]

Affected configurations

Vulners
Node
ciscomobility_services_engineMatchany
OR
ciscomobility_services_engineMatchany
VendorProductVersionCPE
ciscomobility_services_engineanycpe:2.3:h:cisco:mobility_services_engine:any:*:*:*:*:*:*:*

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.003

Percentile

68.6%

Related for CISCO-SA-20151104-MSE-CRED