Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
/opt/rv/Versions/CurrentVersion/Mcu/Config/Mcu.val in Cisco Unified Videoconferencing (UVC) System 5110 and 5115, when the Linux operating system is used, uses a weak hashing algorithm for the (1) administrator and (2) operator passwords, which makes it easier for local users to obtain sensitive information by recovering the cleartext values, aka Bug ID CSCti54010.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Cisco UVC System多个产品Config/Mcu.val文件加密问题漏洞
Vulnerability Description
Cisco Unified Videoconferencing 是思科统一通信系统的一个组成部分,适用于需要一个可靠、便于管理、经济有效的网络基础设施,来进行视频会议应用部署的机构和电信运营商。 Cisco Unified Videoconferencing(UVC)System 5110和5115中的/opt/rv/Versions/CurrentVersion/Mcu/Config/Mcu.val文件在使用Linux操作系统时,对(1)管理员和(2)操作者的密码使用了弱哈希算法。本地用户更容易通过修复
CVSS Information
N/A
Vulnerability Type
N/A