Cisco warns of NetFlow vulnerability

By

Cisco's IP traffic-collection software contains a vulnerability that can provide attackers with unauthorised access and grant them full administrative control to an operating system, the networking giant reported in an advisory.

Cisco warns of NetFlow vulnerability
Versions prior to 6.0 of Cisco's NetFlow Collection Engine have a flaw that creates default accounts containing identical usernames and passwords, allowing attackers to bypass security checks, according to a French Security Incident Response Team (FrSIRT) advisory issued Wednesday.

The team rated the bug as a "moderate risk," but it can be remotely exploited.

Upon installation of NetFlow Circulation Engine, default user credentials are created, according to an advisory from US-CERT, resulting in remote attackers with knowledge of the credentials being able to gain access to an affected system.

Cisco recommended upgrading to version 6.0, which is not a free download.

The NetFlow Collection Engine is used to collect and analyze IP traffic from devices, such as switches and routers, according to Cisco. The data helps administrators detect threats such as DoS attacks and worms.
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

University of Western Australia resets all staff and student passwords

University of Western Australia resets all staff and student passwords

"Shade BIOS" stealth malware hides below operating system

"Shade BIOS" stealth malware hides below operating system

Researchers poke further holes in TETRA encrypted wireless comms

Researchers poke further holes in TETRA encrypted wireless comms

"BitUnlocker" full-volume encryption bypass found by Microsoft researchers

"BitUnlocker" full-volume encryption bypass found by Microsoft researchers

Log In

  |  Forgot your password?