Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.807524
Kategorie:CISCO
Titel:Cisco NX-OS Default Credentials Vulnerability
Zusammenfassung:Cisco NX-OS Software is prone to a default credentials; vulnerability.
Beschreibung:Summary:
Cisco NX-OS Software is prone to a default credentials
vulnerability.

Vulnerability Insight:
The flaw is due to a user account that has a default and static
password. This account is created at installation and cannot be changed or deleted without
impacting the functionality of the system.

Vulnerability Impact:
Successful exploitation allows an unauthenticated, remote
attacker to log in to the device with the privileges of the root user with bash shell access.

Affected Software/OS:
Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000
devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices.

Solution:
Update to Cisco NX-OS 6.0(2)U6(1a), 6.0(2)U6(2a), 6.0(2)U6(3a),
6.0(2)U6(4a), 6.0(2)U6(5a) or later for Nexus 3000 devices or to 6.0(2)A6(1a), 6.0(2)A6(2a),
6.0(2)A6(3a), 6.0(2)A6(4a), 6.0(2)A6(5a), 6.0(2)A7(1a) or later for Nexus 3500 devices.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-1329
Cisco Security Advisory: 20160302 Cisco Nexus 3000 Series and 3500 Platform Switches Insecure Default Credentials Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k
https://isc.sans.edu/forums/diary/20795
http://www.securitytracker.com/id/1035161
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.