Vulnerability identifier: #VU12791
Vulnerability risk: High
CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-798
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco Digital Network Architecture Center
Web applications /
Remote management & hosting panels
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to log in to an affected system by using an administrative account that has default, static user credentials.
The weakness exist due to the presence of undocumented, static user credentials for the default administrative account. A remote attacker can use a backdoor account to log into the system and execute arbitrary commands with root privileges.
Mitigation
Update to version 1.1.3.
Vulnerable software versions
Cisco Digital Network Architecture Center: 1.1 - 1.1.2
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.