Wednesday, December 7, 2016

Cisco IOS XR Software Default Credentials Vulnerability

A vulnerability in Cisco IOS XR Software could allow an authenticated, local attacker to log in to the device with the privileges of the root user.

The vulnerability is due to a user account that has a default and static password. An attacker could exploit this vulnerability by connecting to the affected system using this default account. An exploit could allow the attacker to log in with the default credentials, allowing the attacker to gain complete control of the underlying operating system.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2hgYDOI A vulnerability in Cisco IOS XR Software could allow an authenticated, local attacker to log in to the device with the privileges of the root user.

The vulnerability is due to a user account that has a default and static password. An attacker could exploit this vulnerability by connecting to the affected system using this default account. An exploit could allow the attacker to log in with the default credentials, allowing the attacker to gain complete control of the underlying operating system.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2hgYDOI
Security Impact Rating: Medium
CVE: CVE-2016-9215

from Cisco Security Advisory http://ift.tt/2hgYDOI

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.