copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2013.0520 - [Cisco][RedHat] Cisco Prime Network Control System: Unauthorised access - Existing account

Date: 11 April 2013

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0520
           Cisco Prime Network Control Systems Database Default
                         Credentials Vulnerability
                               11 April 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Prime Network Control System
Publisher:         Cisco Systems
Operating System:  Red Hat Enterprise Linux Server 5
                   Cisco
Impact/Access:     Unauthorised Access -- Existing Account
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-ncs

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Cisco Prime Network Control Systems Database
Default Credentials Vulnerability

Advisory ID: cisco-sa-20130410-ncs

Revision 1.0

For Public Release 2013 April 10 16:00  UTC (GMT)

+----------------------------------------------------------------------

Summary
=======

Cisco Prime Network Control System NCS appliances that are running
software versions prior to 1.1.1.24 contain a database user account that
is created with default credentials. An attacker could use this account
to modify the configuration of the application or disrupt services.

A software upgrade is required to resolve this vulnerability.

Cisco has released free software updates that address this
vulnerability. There is no workaround for this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-ncs

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iF4EAREIAAYFAlFlkSkACgkQUddfH3/BbTrRtQEAjKEfrZ4g2yWNSGLKq4eYQtGy
+N+7Dea/oX5EQtOnnqEA/3h6A5A+RsvGrcVAse061dKJCwT0X2q3khD437CqSYZy
=TLJ/
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=O9dU
-----END PGP SIGNATURE-----