Cisco video surveillance kit has hard-coded password

By

Critical flaw means attackers could get root and then watch anything.

Cisco has admitted that some of its video surveillance products have “undocumented, default, static user credentials” that could be used to take total control of a device.

Cisco video surveillance kit has hard-coded password

The critical-rated bug, detailed here, impacts “Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS).”

“The vulnerability is due to the presence of undocumented, default, static user credentials for the root account of the affected software on certain systems,” Cisco’s advisory explains.

“An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.”

There’s a tiny ray of sunshine in news “The user credentials are not documented publicly”. The bug also only made it into versions 7.10, 7.11, and 7.11.1 of VSM and even then only if it was pre-installed by Cisco onto four SKUs of the UCS product.

On the downside, version 7.10 was released in March 2018, so the problem – and the chance for the default password to leak – has been present for over six months

The fix is simple: Cisco VSM Software 7.12 is available now.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Service NSW centralises security, networking in mammoth CloudOps overhaul

Service NSW centralises security, networking in mammoth CloudOps overhaul

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Log In

  |  Forgot your password?