Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cisco Video Surveillance Manager Appliance Default Password Vulnerability
Vulnerability Description
A vulnerability in Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS) platforms could allow an unauthenticated, remote attacker to log in to an affected system by using the root account, which has default, static user credentials. The vulnerability is due to the presence of undocumented, default, static user credentials for the root account of the affected software on certain systems. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.
CVSS Information
N/A
Vulnerability Type
使用硬编码的凭证
Vulnerability Title
多款Cisco产品Video Surveillance Manager Software 安全漏洞
Vulnerability Description
Cisco CPS-UCSM4-1RU-K9等都是美国Cisco公司的联网保全与安全统一计算系统平台。Video Surveillance Manager(VSM)Software是使用在其中的一款视频监控管理器。 多款Cisco产品上的VSM Software 7.10版本、7.11版本和7.11.1版本中存在安全漏洞,该漏洞源于程序为root账户使用了未记录的默认静态用户凭证。远程攻击者可通过使用该账户登录受影响系统利用该漏洞以root用户身份执行任意命令。以下产品受到影响:Cisco CPS-UCS
CVSS Information
N/A
Vulnerability Type
N/A