Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-6640

Опубликовано: 08 июн. 2017
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Средний

Описание

A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using an account that has a default, static password. The account could be granted root- or system-level privileges. The vulnerability exists because the affected software has a default user account that has a default, static password. The user account is created automatically when the software is installed. An attacker could exploit this vulnerability by connecting remotely to an affected system and logging in to the affected software by using the credentials for this default user account. A successful exploit could allow the attacker to use this default user account to log in to the affected software and gain access to the administrative console of a DCNM server. This vulnerability affects Cisco Prime Data Center Network Manager (DCNM) Software releases prior to Release 10.2(1) for Microsoft Windows, Lin

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:prime_data_center_network_manager:10.1\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_data_center_network_manager:10.1\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_data_center_network_manager:10.1.0:*:*:*:*:*:*:*

EPSS

Процентиль: 98%
0.46097
Средний

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-264
CWE-770

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using an account that has a default, static password. The account could be granted root- or system-level privileges. The vulnerability exists because the affected software has a default user account that has a default, static password. The user account is created automatically when the software is installed. An attacker could exploit this vulnerability by connecting remotely to an affected system and logging in to the affected software by using the credentials for this default user account. A successful exploit could allow the attacker to use this default user account to log in to the affected software and gain access to the administrative console of a DCNM server. This vulnerability affects Cisco Prime Data Center Network Manager (DCNM) Software releases prior to Release 10.2(1) for Microsoft Windows, ...

fstec
больше 8 лет назад

Уязвимость системы сетевого управления центром обработки данных Prime Data Center Network Manager, вызванная созданием учётной записи с предустановленным стандартным паролем и позволяющая нарушителю получить доступ с правами администратора к консоли сервера DCNM

EPSS

Процентиль: 98%
0.46097
Средний

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-264
CWE-770