A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2019-03-13T21:00:00Z
Updated: 2024-11-19T19:15:01.451Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1723
Vulnrichment
Updated: 2024-08-04T18:28:42.282Z
NVD
Status : Modified
Published: 2019-03-13T21:29:00.307
Modified: 2024-11-21T04:37:10.867
Link: CVE-2019-1723
Redhat
No data.