Cisco Patched Critical Vulnerability With Video Surveillance Manager Appliance

Haythem Elmir

Cisco patched a critical security vulnerability with Cisco Video Surveillance Manager (VSM) that allows an unauthenticated remote attacker to gain access to the vulnerable system as a root user, which has a default, static user credentials.

This vulnerability could be exploited by an attacker by using the account to log in to the affected system, successful exploitation of the vulnerability allows an attacker to log in with the system as a root user and run arbitrary commands as a root user.

The vulnerability affects preinstalled software versions of Cisco Video Surveillance Manager (VSM) Software Releases 7.10, 7.11, and 7.11.1 that installed with following Cisco Connected Safety and Security Unified Computing System (UCS) platforms:


Cisco also confirmed the following products are not affected

  • Cisco VSM Software Releases 7.9 and earlier.
  • Cisco VSM Software Releases 7.10, 7.11, and 7.11.1 running on CPS-UCSM4-1RU-K9 and CPS-UCSM4-1RU-K9 platforms if Cisco VSM Software Release 7.9 or earlier was preinstalled on the platform by Cisco and the software was subsequently upgraded to Release 7.10, 7.11, or 7.11.1 by the customer.
  • Cisco VSM Software that is running on the VMware ESXi platform.

This vulnerability exists because the root account of the affected software was not disabled before Cisco installed the software on the vulnerable platforms reads Cisco Security Advisory.

There are no workarounds to fix the vulnerability, the only way is to update the Cisco VSM to latest software release 7.12.

Starting this September Cisco released patches for 30 vulnerabilities affecting multiple products that include 3 critical vulnerabilities, 13 High severity vulnerabilities, and 14 medium level vulnerabilities.

To read the original article:

Laisser un commentaire

Next Post

Experts uncovered a new Adwind campaign aimed at Linux, Windows, and macOS systems

Researchers from ReversingLabs and Cisco Talos have uncovered a new Adwind campaign that targets Linux, Windows, and macOS systems. Security experts from ReversingLabs and Cisco Talos have spotted a new Adwind campaign that targets Linux, Windows, and macOS systems. Adwind is a remote access Trojan (RAT), the samples used in the recently discovered campaign are Adwind […]