A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107405 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-cspcscv | Patch Vendor Advisory |
https://www.info-sec.ca/advisories/Cisco-Collector.html | Third Party Advisory |
http://www.securityfocus.com/bid/107405 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-cspcscv | Patch Vendor Advisory |
https://www.info-sec.ca/advisories/Cisco-Collector.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107405 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-cspcscv - Patch, Vendor Advisory | |
References | () https://www.info-sec.ca/advisories/Cisco-Collector.html - Third Party Advisory |
Information
Published : 2019-03-13 21:29
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1723
Mitre link : CVE-2019-1723
CVE.ORG link : CVE-2019-1723
JSON object : View
Products Affected
cisco
- common_services_platform_collector