Credentials management in Cisco Web Security Appliance - CVE-2017-6750

 

Credentials management in Cisco Web Security Appliance - CVE-2017-6750

Published: May 16, 2018


Vulnerability identifier: #VU12768
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6750
CWE-ID: CWE-255
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Web Security Appliance

Detailed vulnerability description

The vulnerability allows a local unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a user account that has a default and static password. A local attacker can connect to the target system using this default account, log in with the default credentials and view the system's serial number by using the CLI or download reports by using the web interface.

How to mitigate CVE-2017-6750

Update to versions 11.5.0-614, 10.5.1-296, 10.5.1-270 or 10.1.2-036.

Sources