CVE-2019-1723 is a vulnerability in Cisco Common Services Platform Collector
Published on March 13, 2019
Cisco Common Services Platform Collector Static Credential Vulnerability
A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.
Weakness Type
Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Products Associated with CVE-2019-1723
Want to know whenever a new CVE is published for Cisco Common Services Platform Collector? stack.watch will email you.
Affected Versions
Cisco Common Services Platform Collector Software:- Version unspecified and below 2.7.4.6 is affected.
- Version unspecified and below 2.8.1.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.