Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Default Account in Cisco CSPC Allows Unauthorized Access

Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.

Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.

Cisco CSPC is an SNMP-based tool that collects information from Cisco devices installed on a network. The tool is used by both Smart Net Total Care (SmartNet) Network Collector and Partner Support Service (PSS) Network Collector.

The flaw, tracked as CVE-2019-1723, is related to the existence of a default account with a static password. While the account does not have admin privileges, it can still be useful to malicious actors as it allows an unauthenticated attacker to gain remote access to the system.

The vulnerability, discovered by researcher David Coomber, impacts CSPC releases 2.7.2 through 2.7.4.5 and all 2.8.x releases. Patches are included in versions 2.7.4.6 and 2.8.1.2.

Cisco says it’s not aware of any attacks exploiting this flaw.

The networking giant this week also informed customers of a high-severity denial-of-service (DoS) vulnerability in Small Business SPA514G IP Phones.

Advertisement. Scroll to continue reading.

The security hole impacts the Session Initiation Protocol (SIP) processing implementation of these devices and it can be exploited remotely without authentication to cause a device to become unresponsive until it’s manually restarted.

Cisco says it does not plan on releasing a patch for this flaw as the impacted IP phone has reached end of life. The issue was discovered during internal testing and there is no evidence of malicious exploitation.

Earlier this month, Cisco released patches for over two dozen serious vulnerabilities impacting its Nexus switches, including flaws that can be exploited for DoS attacks, arbitrary code execution, and privilege escalation.

The company has also published an informational advisory urging Nexus device owners to secure networks where the PowerOn Auto Provisioning (POAP) feature is used or disable the feature if it’s not needed.

Related:Hackers Target Cisco Routers via Recently Patched Flaws

Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.