Cisco Network Registrar prior to 7.2 has a default administrative password, which makes it easier for remote malicious users to obtain access via a TCP session, aka Bug ID CSCsm50627.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco cns network registrar 6.0.1 |
||
cisco cns network registrar 6.0.2 |
||
cisco cns network registrar 6.0.5.3 |
||
cisco cns network registrar 6.0.5.2 |
||
cisco cns network registrar 6.1.1.4 |
||
cisco cns network registrar 6.2.4 |
||
cisco cns network registrar 6.3 |
||
cisco cns network registrar 7.1.2.1 |
||
cisco cns network registrar |
||
cisco cns network registrar 6.1.1.2 |
||
cisco cns network registrar 6.1.1.1 |
||
cisco cns network registrar 6.1.1 |
||
cisco cns network registrar 6.0.3 |
||
cisco cns network registrar 6.1.4.2 |
||
cisco cns network registrar 6.1.6 |
||
cisco cns network registrar 6.3.3 |
||
cisco cns network registrar 7.0 |
||
cisco cns network registrar 6.1.1.3 |
||
cisco cns network registrar 6.0 |
||
cisco cns network registrar 6.0.4 |
||
cisco cns network registrar 6.0.5 |
||
cisco cns network registrar 6.2 |
||
cisco cns network registrar 6.2.3 |
||
cisco cns network registrar 7.0.1 |
||
cisco cns network registrar 7.1 |
||
cisco cns network registrar 7.1.1 |
||
cisco cns network registrar 6.0.5.4 |
||
cisco cns network registrar 6.1 |
||
cisco cns network registrar 6.1.4 |
||
cisco cns network registrar 6.1.4.1 |
||
cisco cns network registrar 6.3.1 |
||
cisco cns network registrar 6.3.2 |