cisco video-surveillance-manager CVE-2018-15427 is a vulnerability in Cisco Video Surveillance Manager
Published on October 5, 2018

Cisco Video Surveillance Manager Appliance Default Password Vulnerability
A vulnerability in Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS) platforms could allow an unauthenticated, remote attacker to log in to an affected system by using the root account, which has default, static user credentials. The vulnerability is due to the presence of undocumented, default, static user credentials for the root account of the affected software on certain systems. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.

Vendor Advisory NVD

Weakness Type

Use of Hard-coded Credentials

The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.


Products Associated with CVE-2018-15427

Want to know whenever a new CVE is published for Cisco Video Surveillance Manager? stack.watch will email you.

 

Affected Versions

Cisco Video Surveillance Manager Version n/a is affected by CVE-2018-15427

Exploit Probability

EPSS
7.52%
Percentile
91.73%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.