Remote Code Execution Vulnerability in Cisco Elastic Services Controller Software
CVE-2018-0130
9.8CRITICAL
Key Information:
- Vendor
- Cisco
- Vendor
- CVE Published:
- 22 February 2018
Summary
A security flaw in Cisco Elastic Services Controller Software permits remote, unauthenticated attackers to bypass authentication and gain administrative access to the web-based service portal. This vulnerability arises from the use of static default credentials, which can be exploited if an attacker retrieves these credentials from an image of the affected software. Once obtained, the attacker can craft a valid session token to access other installations of the software, leading to potentially severe security breaches.
Affected Version(s)
Cisco Elastic Services Controller Cisco Elastic Services Controller
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved