641
VMScore

CVE-2018-0141

Published: 08/03/2018 Updated: 09/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.4 | Impact Score: 5.9 | Exploitability Score: 2.5
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software 11.6 could allow an unauthenticated, local malicious user to log in to the underlying Linux operating system. The vulnerability is due to a hard-coded account password on the system. An attacker could exploit this vulnerability by connecting to the affected system via Secure Shell (SSH) using the hard-coded credentials. A successful exploit could allow the malicious user to access the underlying operating system as a low-privileged user. After low-level privileges are gained, the attacker could elevate to root privileges and take full control of the device. Cisco Bug IDs: CSCvc82982.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco prime collaboration provisioning 11.6

cisco prime collaboration 11.6

cisco prime collaboration assurance 11.6

Vendor Advisories

A vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software could allow an unauthenticated, local attacker to log in to the underlying Linux operating system The vulnerability is due to a hard-coded account password on the system An attacker could exploit this vulnerability by connecting to the affected system via Secure Shell (SSH) ...

Recent Articles

Sigh. Cisco security kit has Java deserialisation bug and a default password SNAFU
The Register • Richard Chirgwin • 08 Mar 2018

Two critical vulnerabilities among 20 patches

Cisco's security developers have served up a parcel of patches. First up, there's a gem in Switchzilla's Secure Access Control System. The ACS (which ceased sale in August 2017) is a hardware-based login gatekeeper, and it's got a remotely-pwnable Java deserialisation bug. Cisco's notice for CVE-2018-0147 says an attacker could exploit the bug with a crafted Java object, and gain root privilege. The bug affects all units running software up to version 5.8 patch 9, and fortunately while no longer...