Security Experts:

Connect with us

Hi, what are you looking for?


Identity & Access

Default Account in Cisco CSPC Allows Unauthorized Access

Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.

Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.

Cisco CSPC is an SNMP-based tool that collects information from Cisco devices installed on a network. The tool is used by both Smart Net Total Care (SmartNet) Network Collector and Partner Support Service (PSS) Network Collector.

The flaw, tracked as CVE-2019-1723, is related to the existence of a default account with a static password. While the account does not have admin privileges, it can still be useful to malicious actors as it allows an unauthenticated attacker to gain remote access to the system.

The vulnerability, discovered by researcher David Coomber, impacts CSPC releases 2.7.2 through and all 2.8.x releases. Patches are included in versions and

Cisco says it’s not aware of any attacks exploiting this flaw.

The networking giant this week also informed customers of a high-severity denial-of-service (DoS) vulnerability in Small Business SPA514G IP Phones.

The security hole impacts the Session Initiation Protocol (SIP) processing implementation of these devices and it can be exploited remotely without authentication to cause a device to become unresponsive until it’s manually restarted.

Cisco says it does not plan on releasing a patch for this flaw as the impacted IP phone has reached end of life. The issue was discovered during internal testing and there is no evidence of malicious exploitation.

Earlier this month, Cisco released patches for over two dozen serious vulnerabilities impacting its Nexus switches, including flaws that can be exploited for DoS attacks, arbitrary code execution, and privilege escalation.

The company has also published an informational advisory urging Nexus device owners to secure networks where the PowerOn Auto Provisioning (POAP) feature is used or disable the feature if it’s not needed.

Related:Hackers Target Cisco Routers via Recently Patched Flaws

Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.