HomeVulnerabilityCisco fixes hard-coded root credentials in Emergency Responder

Cisco fixes hard-coded root credentials in Emergency Responder

Cisco launched security updates to repair a Cisco Emergency Responder (CER) vulnerability that allow attackers log into unpatched techniques utilizing hard-coded credentials.

CER helps organizations reply successfully to emergencies by enabling correct location monitoring of IP telephones, permitting emergency calls to be routed to the suitable Public Security Answering Level (PSAP).

Tracked as CVE-2023-20101, the security flaw permits unauthenticated attackers to entry a focused system utilizing the basis account, which had default, static credentials that might not be modified or eliminated.

“This vulnerability is because of the presence of static consumer credentials for the basis account which might be sometimes reserved to be used throughout growth,” Cisco defined in an advisory issued at this time.

“An attacker may exploit this vulnerability by utilizing the account to log in to an affected system. A profitable exploit may permit the attacker to log in to the affected system and execute arbitrary instructions as the basis consumer.”

The corporate says the important vulnerability solely impacts Cisco Emergency Responder model 12.5(1)SU4, as proven within the desk under.

See also  Faux F5 BIG-IP zero-day warning emails push information wipers
CER Launch Susceptible Launch Mounted Launch
11.5(1) and earlier Not susceptible Not susceptible
12.5(1) 12.5(1)SU4 12.5(1)SU5
ciscocm.CSCwh34565_PRIVILEGED_ACCESS_DISABLE.k4.cop.sha512
14 Not susceptible Not susceptible

Cisco says the hard-coded credentials weak spot that permits attackers to bypass the authentication has been found throughout inner security testing.

Its Product Safety Incident Response Group (PSIRT) has not found details about public disclosures or any malicious exploitation associated to the CVE-2023-20101 vulnerability.

There are not any workarounds to mitigate this security flaw briefly, so admins are suggested to replace susceptible installations as quickly as potential.

Final week, Cisco urged prospects to patch a zero-day vulnerability (CVE-2023-20109) focused by attackers within the wild, affecting gadgets operating IOS and IOS XE software program.

Earlier this month, the corporate issued an alert relating to one other zero-day (CVE-2023-20269) in its Cisco Adaptive Safety Equipment (ASA) and Cisco Firepower Menace Protection (FTD), actively exploited by ransomware gangs to breach company networks.

US and Japanese regulation enforcement and cybersecurity businesses additionally warned of Chinese language BlackTech hackers backdooring community gadgets for preliminary entry to enterprise networks.

See also  Researchers Uncover Vulnerabilities in Solarman and Deye Photo voltaic Programs
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular