|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Cisco Prime Network Control Systems: log in via database user
Synthesis of the vulnerability
An attacker can use the login and the password of the database user of Cisco Prime Network Control Systems, in order to log in via SSH.
Impacted products: Cisco Prime.
Creation date: 11/04/2013.
Revision date: 03/07/2013.
Identifiers: 28796, BID-59013, CERTA-2013-AVI-239, cisco-sa-20130410-ncs, CSCtz30468, CSCub54624, CVE-2013-1170, VIGILANCE-VUL-12647.
Description of the vulnerability
The Cisco Prime NCS (Network Control Systems) product uses a database.
However, the login and the password of the user who accesses to this database are constant. Moreover, they can be used via SSH.
An attacker can therefore use the login and the password of the database user of Cisco Prime Network Control Systems, in order to log in via SSH.
Complete Vigil@nce bulletin.... (free trial)
Computer vulnerabilities tracking service
Vigil@nce provides systems vulnerabilities alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system.