10
CVSSv2

CVE-2011-2024

Published: 02/06/2011 Updated: 29/08/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Cisco Network Registrar prior to 7.2 has a default administrative password, which makes it easier for remote malicious users to obtain access via a TCP session, aka Bug ID CSCsm50627.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco cns network registrar 6.0.1

cisco cns network registrar 6.0.2

cisco cns network registrar 6.0.5.3

cisco cns network registrar 6.0.5.2

cisco cns network registrar 6.1.1.4

cisco cns network registrar 6.2.4

cisco cns network registrar 6.3

cisco cns network registrar 7.1.2.1

cisco cns network registrar

cisco cns network registrar 6.1.1.2

cisco cns network registrar 6.1.1.1

cisco cns network registrar 6.1.1

cisco cns network registrar 6.0.3

cisco cns network registrar 6.1.4.2

cisco cns network registrar 6.1.6

cisco cns network registrar 6.3.3

cisco cns network registrar 7.0

cisco cns network registrar 6.1.1.3

cisco cns network registrar 6.0

cisco cns network registrar 6.0.4

cisco cns network registrar 6.0.5

cisco cns network registrar 6.2

cisco cns network registrar 6.2.3

cisco cns network registrar 7.0.1

cisco cns network registrar 7.1

cisco cns network registrar 7.1.1

cisco cns network registrar 6.0.5.4

cisco cns network registrar 6.1

cisco cns network registrar 6.1.4

cisco cns network registrar 6.1.4.1

cisco cns network registrar 6.3.1

cisco cns network registrar 6.3.2

Vendor Advisories

Cisco Network Registrar Software Releases prior to 72 contain a default password for the administrative account During the initial installation, users are not forced to change this password, allowing it to persist after the installation An attacker who is aware of this vulnerability could authenticate with administrative privileges and arbitrari ...