The vulnerability is due to a user account that has a default and static password. This account is created at installation and cannot be changed or deleted without impacting the functionality of the system. An attacker could exploit this vulnerability by remotely connecting to the affected system via SSH using this account. A successful exploit could allow the attacker to log in to the MSE using the default oracle account.
Cisco has released software updates that address this vulnerability. A workaround that mitigates this vulnerability is available.
This advisory is available at the following link: http://ift.tt/1kaJgEY
from Cisco Security Advisory http://ift.tt/1kaJgEY
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.