Cisco patched a critical security vulnerability with Cisco Video Surveillance Manager (VSM) that allows an unauthenticated remote attacker to gain access to the vulnerable system as a root user, which has a default, static user credentials.
This vulnerability could be exploited by an attacker by using the account to log in to the affected system, successful exploitation of the vulnerability allows an attacker to log in with the system as a root user and run arbitrary commands as a root user.
The vulnerability affects preinstalled software versions of Cisco Video Surveillance Manager (VSM) Software Releases 7.10, 7.11, and 7.11.1 that installed with following Cisco Connected Safety and Security Unified Computing System (UCS) platforms:
CPS-UCSM4-1RU-K9
CPS-UCSM4-2RU-K9
KIN-UCSM5-1RU-K9
KIN-UCSM5-2RU-K9
Cisco also confirmed the following products are not affected
- Cisco VSM Software Releases 7.9 and earlier.
- Cisco VSM Software Releases 7.10, 7.11, and 7.11.1 running on CPS-UCSM4-1RU-K9 and CPS-UCSM4-1RU-K9 platforms if Cisco VSM Software Release 7.9 or earlier was preinstalled on the platform by Cisco and the software was subsequently upgraded to Release 7.10, 7.11, or 7.11.1 by the customer.
- Cisco VSM Software that is running on the VMware ESXi platform.
This vulnerability exists because the root account of the affected software was not disabled before Cisco installed the software on the vulnerable platforms reads Cisco Security Advisory.
There are no workarounds to fix the vulnerability, the only way is to update the Cisco VSM to latest software release 7.12.
Starting this September Cisco released patches for 30 vulnerabilities affecting multiple products that include 3 critical vulnerabilities, 13 High severity vulnerabilities, and 14 medium level vulnerabilities.
To read the original article:
https://gbhackers.com/cisco-patched-critical-security-vulnerability/