Published: 22/02/2014 Updated: 08/09/2016
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Cisco UCS Director (formerly Cloupia) prior to has a hardcoded password for the root account, which makes it easier for remote malicious users to obtain administrative access via an SSH session to the CLI interface, aka Bug ID CSCui73930.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ucs director

cisco ucs director

cisco ucs director

Vendor Advisories

A vulnerability in Cisco Unified Computing System (UCS) Director could allow an unauthenticated, remote attacker to take complete control of the affected device The vulnerability is due to a default root user account created during installation An attacker could exploit this vulnerability by accessing the server command-line interface (CLI) remo ...