Cisco released security updates to address a critical vulnerability in its Cisco Common Services Platform Collector (CSPC) software.

Cisco released security updates to address a critical flaw, tracked as CVE-2019-1723, that consists in the presence of a default account with a static password. The account hasn’t admin privileges, but it could be exploited by an unauthenticated attacker to gain remote access to the system.

The Cisco Common Services Platform Collector (CSPC) is a tool that collects information from Cisco devices installed on a network. The SNMP-based tool is used by both Smart Net Total Care (SmartNet) Network Collector and Partner Support Service (PSS) Network Collector.

“A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges.” reads the security advisory published by Cisco.

“The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account.”

The vulnerability was reported to Cisco by the security researcher David Coomber. According to Cisco, the flaw affects CSPC releases 2.7.2 through 2.7.4.5 and all 2.8.x releases, the tech giant addressed it with the release of the versions 2.7.4.6 and 2.8.1.2.

The good news is that Cisco is not aware of any attacks exploiting this vulnerability in the wild.

Earlier this month, Cisco released security updates to address dozens of vulnerabilities impacting the Nexus switches.

Pierluigi Paganini

( SecurityAffairs – Cisco Common Services Platform Collector, hacking)

Share this...

Linkedin Reddit Pinterest

Share On