A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.
History

Tue, 19 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-03-13T21:00:00Z

Updated: 2024-11-19T19:15:01.451Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1723

cve-icon Vulnrichment

Updated: 2024-08-04T18:28:42.282Z

cve-icon NVD

Status : Modified

Published: 2019-03-13T21:29:00.307

Modified: 2024-11-21T04:37:10.867

Link: CVE-2019-1723

cve-icon Redhat

No data.