Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.
Cisco CSPC is an SNMP-based tool that collects information from Cisco devices installed on a network. The tool is used by both Smart Net Total Care (SmartNet) Network Collector and Partner Support Service (PSS) Network Collector.
The flaw, tracked as CVE-2019-1723, is related to the existence of a default account with a static password. While the account does not have admin privileges, it can still be useful to malicious actors as it allows an unauthenticated attacker to gain remote access to the system.
The vulnerability, discovered by researcher David Coomber, impacts CSPC releases 2.7.2 through 2.7.4.5 and all 2.8.x releases. Patches are included in versions 2.7.4.6 and 2.8.1.2.
Cisco says it’s not aware of any attacks exploiting this flaw.
The networking giant this week also informed customers of a high-severity denial-of-service (DoS) vulnerability in Small Business SPA514G IP Phones.
The security hole impacts the Session Initiation Protocol (SIP) processing implementation of these devices and it can be exploited remotely without authentication to cause a device to become unresponsive until it’s manually restarted.
Cisco says it does not plan on releasing a patch for this flaw as the impacted IP phone has reached end of life. The issue was discovered during internal testing and there is no evidence of malicious exploitation.
Earlier this month, Cisco released patches for over two dozen serious vulnerabilities impacting its Nexus switches, including flaws that can be exploited for DoS attacks, arbitrary code execution, and privilege escalation.
The company has also published an informational advisory urging Nexus device owners to secure networks where the PowerOn Auto Provisioning (POAP) feature is used or disable the feature if it’s not needed.
Related:Hackers Target Cisco Routers via Recently Patched Flaws
Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
