CVE-2015-4196

Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.4:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150701-cucdm - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150701-cucdm - Vendor Advisory
References () http://www.securitytracker.com/id/1032774 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1032774 - Third Party Advisory, VDB Entry

Information

Published : 2015-07-04 10:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-4196

Mitre link : CVE-2015-4196

CVE.ORG link : CVE-2015-4196


JSON object : View

Products Affected

cisco

  • unified_communications_domain_manager
CWE
CWE-255

Credentials Management Errors