CVE-2014-0709

Cisco UCS Director (formerly Cloupia) before 4.0.0.3 has a hardcoded password for the root account, which makes it easier for remote attackers to obtain administrative access via an SSH session to the CLI interface, aka Bug ID CSCui73930.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:4.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:4.0.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:02

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ucsdĀ - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ucsdĀ - Vendor Advisory

Information

Published : 2014-02-22 21:55

Updated : 2024-11-21 02:02


NVD link : CVE-2014-0709

Mitre link : CVE-2014-0709

CVE.ORG link : CVE-2014-0709


JSON object : View

Products Affected

cisco

  • ucs_director
CWE
CWE-255

Credentials Management Errors