Cisco UCS Director (formerly Cloupia) before 4.0.0.3 has a hardcoded password for the root account, which makes it easier for remote attackers to obtain administrative access via an SSH session to the CLI interface, aka Bug ID CSCui73930.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ucsd | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ucsd | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ucsdĀ - Vendor Advisory |
Information
Published : 2014-02-22 21:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0709
Mitre link : CVE-2014-0709
CVE.ORG link : CVE-2014-0709
JSON object : View
Products Affected
cisco
- ucs_director
CWE
CWE-255
Credentials Management Errors