Thursday, March 28, 2024

Cisco Patched Critical Vulnerability With Video Surveillance Manager Appliance

Cisco patched a critical security vulnerability with Cisco Video Surveillance Manager (VSM) that allows an unauthenticated remote attacker to gain access to the vulnerable system as a root user, which has a default, static user credentials.

This vulnerability could be exploited by an attacker by using the account to log in to the affected system, successful exploitation of the vulnerability allows an attacker to log in with the system as a root user and run arbitrary commands as a root user.

The vulnerability affects preinstalled software versions of Cisco Video Surveillance Manager (VSM) Software Releases 7.10, 7.11, and 7.11.1 that installed with following Cisco Connected Safety and Security Unified Computing System (UCS) platforms:

CPS-UCSM4-1RU-K9
CPS-UCSM4-2RU-K9
KIN-UCSM5-1RU-K9
KIN-UCSM5-2RU-K9

Cisco also confirmed the following products are not affected

  • Cisco VSM Software Releases 7.9 and earlier.
  • Cisco VSM Software Releases 7.10, 7.11, and 7.11.1 running on CPS-UCSM4-1RU-K9 and CPS-UCSM4-1RU-K9 platforms if Cisco VSM Software Release 7.9 or earlier was preinstalled on the platform by Cisco and the software was subsequently upgraded to Release 7.10, 7.11, or 7.11.1 by the customer.
  • Cisco VSM Software that is running on the VMware ESXi platform.

This vulnerability exists because the root account of the affected software was not disabled before Cisco installed the software on the vulnerable platforms reads Cisco Security Advisory.

There are no workarounds to fix the vulnerability, the only way is to update the Cisco VSM to latest software release 7.12.

Starting this September Cisco released patches for 30 vulnerabilities affecting multiple products that include 3 critical vulnerabilities, 13 High severity vulnerabilities, and 14 medium level vulnerabilities.

Related Read

Cisco Releases Security Updates that Covers 16 Vulnerabilities that had Critical and High Impact

Cisco Released Security Updates for Multiple Vulnerabilities that Affected Cisco Products

Cisco Released Critical Security Updates for Vulnerabilities that Affected Cisco Products

Website

Latest articles

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles