CVE-2018-15427
Summary
| CVE | CVE-2018-15427 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-10-05 14:29:00 UTC |
| Updated | 2019-10-09 23:35:00 UTC |
| Description | A vulnerability in Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS) platforms could allow an unauthenticated, remote attacker to log in to an affected system by using the root account, which has default, static user credentials. The vulnerability is due to the presence of undocumented, default, static user credentials for the root account of the affected software on certain systems. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user. |
Risk And Classification
Problem Types: CWE-798
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Hardware | Cisco | Connected Safety And Security Ucs C220 | - | All | All | All |
| Application | Cisco | Video Surveillance Manager | 7.10 | All | All | All |
| Application | Cisco | Video Surveillance Manager | 7.11 | All | All | All |
| Application | Cisco | Video Surveillance Manager | 7.11.1 | All | All | All |
| Application | Cisco | Video Surveillance Manager | 7.10 | All | All | All |
| Application | Cisco | Video Surveillance Manager | 7.11 | All | All | All |
| Application | Cisco | Video Surveillance Manager | 7.11.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Video Surveillance Manager Default User Account Lets Remote Users Access the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Cisco Video Surveillance Manager Appliance Default Password Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| Cisco Video Surveillance Manager Appliance CVE-2018-15427 Insecure Default Password Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.