Vulnerabilities > CVE-2015-6316 - Credentials Management vulnerability in Cisco Mobility Services Engine
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The default configuration of sshd_config in Cisco Mobility Services Engine (MSE) through 8.0.120.7 allows logins by the oracle account, which makes it easier for remote attackers to obtain access by entering this account's hardcoded password in an SSH session, aka Bug ID CSCuv40501.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | CGI abuses |
NASL id | CISCO_MSE_8_0_120_7.NASL |
description | According to its self-reported version number, the Cisco MSE version installed on the remote host is prior to 8.0.120.7. It is, therefore, affected by multiple vulnerabilities : - A local privilege escalation vulnerability exists due to the program using insecure permissions for binary files during its physical or virtual appliance installation procedure. A local attacker can exploit this, by writing to a file, to gain root privileges. (CVE-2015-4282) - A security bypass vulnerability exists due to the default configuration of sshd_config allowing logins by the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 86912 |
published | 2015-11-18 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/86912 |
title | Cisco MSE <= 8.0.120.7 Multiple Vulnerabilities |
code |
|
References
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-mse-cred
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-mse-cred
- http://www.securityfocus.com/bid/77432
- http://www.securityfocus.com/bid/77432
- http://www.securitytracker.com/id/1034065
- http://www.securitytracker.com/id/1034065