CERT mailing list archives

Cisco UCS Director Default Credentials Vulnerability


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Fri, 21 Feb 2014 13:21:14 -0600

NCCIC / US-CERT

National Cyber Awareness System:

Cisco UCS Director Default Credentials Vulnerability [ 
https://www.us-cert.gov/ncas/current-activity/2014/02/21/Cisco-UCS-Director-Default-Credentials-Vulnerability ] 
02/21/2014 08:04 AM EST 
Original release date: February 21, 2014

Cisco has released a security advisory to address a vulnerability in Cisco Unified Computing System (UCS) Director. 
This vulnerability could allow an unauthenticated, remote attacker to take complete control of the affected device due 
to a default root user account created during installation. Successful exploitation of this vulnerability would provide 
the attacker with full administrative rights to the system.

US-CERT encourages users and administrators to review the Cisco Security Advisory  [ 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-ucsd ]and apply the update 
provided to address this vulnerability.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ] 

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: