9.3
CVSSv2

CVE-2014-0709

Published: 22/02/2014 Updated: 08/09/2016
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Cisco UCS Director (formerly Cloupia) prior to 4.0.0.3 has a hardcoded password for the root account, which makes it easier for remote malicious users to obtain administrative access via an SSH session to the CLI interface, aka Bug ID CSCui73930.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ucs director

cisco ucs director 4.0.0.0

cisco ucs director 4.0.0.1

Vendor Advisories

A vulnerability in Cisco Unified Computing System (UCS) Director could allow an unauthenticated, remote attacker to take complete control of the affected device The vulnerability is due to a default root user account created during installation An attacker could exploit this vulnerability by accessing the server command-line interface (CLI) remo ...