CVE-2019-1723
moderate-risk
Published 2019-03-13
A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.
Do I need to act?
!
13.3% chance of exploitation in next 30 days
EPSS score — higher than 87% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Common Services Platform Collector
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/107405
Third Party Advisory
https://www.info-sec.ca/advisories/Cisco-Collector.html
Third Party Advisory
http://www.securityfocus.com/bid/107405
Third Party Advisory
https://www.info-sec.ca/advisories/Cisco-Collector.html
49
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
12/34 · Low
Exposure
5/34 · Minimal