#VU12791 Privilege escalation (backdoor) in Cisco Digital Network Architecture Center


Published: 2018-05-17

Vulnerability identifier: #VU12791

Vulnerability risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0222

CWE-ID: CWE-798

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco Digital Network Architecture Center
Web applications / Remote management & hosting panels

Vendor: Cisco Systems, Inc

Description
The vulnerability allows a remote attacker to log in to an affected system by using an administrative account that has default, static user credentials.

The weakness exist due to the presence of undocumented, static user credentials for the default administrative account. A remote attacker can use a backdoor account to log into the system and execute arbitrary commands with root privileges.

Mitigation
Update to version 1.1.3.

Vulnerable software versions

Cisco Digital Network Architecture Center: 1.1 - 1.1.2


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability