Sunday, June 16, 2024

Cisco Patched Critical Vulnerability With Video Surveillance Manager Appliance

Cisco patched a critical security vulnerability with Cisco Video Surveillance Manager (VSM) that allows an unauthenticated remote attacker to gain access to the vulnerable system as a root user, which has a default, static user credentials.

This vulnerability could be exploited by an attacker by using the account to log in to the affected system, successful exploitation of the vulnerability allows an attacker to log in with the system as a root user and run arbitrary commands as a root user.

The vulnerability affects preinstalled software versions of Cisco Video Surveillance Manager (VSM) Software Releases 7.10, 7.11, and 7.11.1 that installed with following Cisco Connected Safety and Security Unified Computing System (UCS) platforms:

CPS-UCSM4-1RU-K9
CPS-UCSM4-2RU-K9
KIN-UCSM5-1RU-K9
KIN-UCSM5-2RU-K9

Cisco also confirmed the following products are not affected

  • Cisco VSM Software Releases 7.9 and earlier.
  • Cisco VSM Software Releases 7.10, 7.11, and 7.11.1 running on CPS-UCSM4-1RU-K9 and CPS-UCSM4-1RU-K9 platforms if Cisco VSM Software Release 7.9 or earlier was preinstalled on the platform by Cisco and the software was subsequently upgraded to Release 7.10, 7.11, or 7.11.1 by the customer.
  • Cisco VSM Software that is running on the VMware ESXi platform.

This vulnerability exists because the root account of the affected software was not disabled before Cisco installed the software on the vulnerable platforms reads Cisco Security Advisory.

There are no workarounds to fix the vulnerability, the only way is to update the Cisco VSM to latest software release 7.12.

Starting this September Cisco released patches for 30 vulnerabilities affecting multiple products that include 3 critical vulnerabilities, 13 High severity vulnerabilities, and 14 medium level vulnerabilities.

Related Read

Cisco Releases Security Updates that Covers 16 Vulnerabilities that had Critical and High Impact

Cisco Released Security Updates for Multiple Vulnerabilities that Affected Cisco Products

Cisco Released Critical Security Updates for Vulnerabilities that Affected Cisco Products

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles