CVE-2016-1329
Summary
| CVE | CVE-2016-1329 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-03-03 11:59:00 UTC |
| Updated | 2016-12-03 03:20:00 UTC |
| Description | Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Nexus 3048 | - | All | All | All |
| Hardware | Cisco | Nexus 3048 | - | All | All | All |
| Hardware | Cisco | Nexus 3064 | - | All | All | All |
| Hardware | Cisco | Nexus 3064 | - | All | All | All |
| Hardware | Cisco | Nexus 3064t | - | All | All | All |
| Hardware | Cisco | Nexus 3064t | - | All | All | All |
| Hardware | Cisco | Nexus 3064x | - | All | All | All |
| Hardware | Cisco | Nexus 3064x | - | All | All | All |
| Hardware | Cisco | Nexus 3524 | - | All | All | All |
| Hardware | Cisco | Nexus 3524 | - | All | All | All |
| Hardware | Cisco | Nexus 3548 | - | All | All | All |
| Hardware | Cisco | Nexus 3548 | - | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)a6\(1\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)a6\(2\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)a6\(3\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)a6\(4\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)a6\(5\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)u6\(1\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)u6\(2\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)u6\(3\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)u6\(4\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\(2\)u6\(5\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(1\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(2\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(3\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(4\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(5\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(1\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(2\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(3\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(4\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(5\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(1\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(2\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(3\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(4\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)a6\\\(5\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(1\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(2\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(3\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(4\\\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.0\\\(2\\\)u6\\\(5\\\) | All | All | All |
| Operating System | Cisco | Nx-ox | 6.0\(2\)a7\(1\) | All | All | All |
| Operating System | Cisco | Nx-ox | 6.0\\\(2\\\)a7\\\(1\\\) | All | All | All |
| Operating System | Cisco | Nx-ox | 6.0\\\(2\\\)a7\\\(1\\\) | All | All | All |
| Operating System | Samsung | X14j Firmware | t-ms14jakucb-1102.5 | All | All | All |
| Operating System | Sun | Opensolaris | snv_124 | All | sparc | All |
| Operating System | Zyxel | Gs1900-10hp Firmware | All | All | All | All |
| Operating System | Zzinc | Keymouse Firmware | 3.08 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Nexus 3000 Series and 3500 Platform Switches Insecure Default Credentials Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| Cisco Nexus 3000 Series Default Account and Credentials Lets Remote Users Access the Target System with Root Privileges - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Cisco Security Advisory: Default Credentials | MISC | isc.sans.edu | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.